Skip to main content

Full text of "Processor Newspaper Volume 30 Number 39"

See other formats

P.O. Box 85518 
Lincoln, NE 68501-5518 


September 26, 2008 
Volume 30 Number 39 

Products, News & Information Data Centers Can Trust. Since 1979 

Which Mobile 
Device Is Right? 

Keep Employee Roles & 
Business Needs In Mind 

by Elizabeth Millard 
• • • 

The market is awash in mobile 
devices, from the latest generation of 
the iPhone to feature-rich laptops 
that can practically do the dishes and 
walk the dog. 

But just because devices are popu- 
lar, pretty, and loaded with options 
doesn't mean they're right for every 
employee. Experts note that when it 
comes to making choices on who 
will carry which device, the decision 
often has to be made at the employee 
level after a survey of their prefer- 
ences, job roles, and needs. 

An administrative assistant won't 
need the same type of device as an 
on-the-go salesperson, and even a 
CEO and a CEO might require dif- 
ferent devices. When surveying employees 
to determine the best fit, there are several 
main factors that come into play. 

Software Use 

The largest consideration in choosing a 
mobile device centers on how it will be 

used, notes Andy Ballema, CDW mobility 
specialist ( 

"Companies must understand the com- 
puting functions each employee relies on 
in order to be successful in their posi- 
tion," he says. Eor example, an employee 
who needs regular access to spreadsheets 
and word processing documents might 

require a different device than one who 
only accesses email and calendar func- 

In addition to what types of software are 
currently in use, employees should be sur- 
veyed about what they'd like to have. 
Mobile applications are being created that 
Go to Page 10 

Leasing Equipment 

What SMEs Should Look 
For Before They Lease 

by Sixto Ortiz Jr. 

In the ever-changing world of modern 
computing, only one thing is certain: 
Companies must frequently invest money 
in new technologies. The reasons for 
investing in technology are legion, from 
business growth to customer demands to 
the need to keep pace with new technolo- 
gy and competitors that are surely invest- 
ing in it. And of course, management 
expects all these investments to be surefire 

bets that deliver maximum bang for the 
buck, purchased with static or even 
shrinking budget dollars. 

That said, enterprises considering invest- 
ing in new equipment should consider leas- 
ing. After all, a set cost and a more estab- 
lished upgrade cycle are two significant 
advantages leasing provides. However, 
administrators should also be aware of the 
disadvantages that come with leasing 
equipment and have plans in place to mini- 
mize them. 

The Leasing Advantage 

At the heart of leasing 's advantages lies 
the guarantee that technology "refreshes" 

A set cost and a more established 
upgrade cycle are two significant advantages 
leasing provides. 

will occur with consistency. Ed Lucente, 
manager of financial services and partners 
at Verari Systems (, says 
leasing can provide better IT life cycle 
management and significantly reduce the 
equipment's total cost of ownership 
because leasing can generate lower IT 
support costs and lower maintenance 
costs associated with the deployment of 
current technology and the most energy- 
efficient assets. 

"A key ingredient of a well-structured 
leasing plan includes, for example, periodic 
technology refreshes so that customers 
remain current with technology and as 
competitive as possible in their industry," 
says Lucente. 

David Cantliffe, president and founder of 
BottomLine Advantage (www.bottomline, a client advocacy consulting 
group, says the question of leasing vs. pur- 
chasing is often answered by the financial 
situation of a business. 

Go to Page 10 

n This 



Helping Your Remote Employee 

What tools do your traveling or remote employ- 
ees need? How can you help solve some of the 
most common problems they'll face? We talked 
with experts to find out. 

Which Mobile Device Is Right? 1 

Here Comes The iPhone 9 

Mobile Woes 11 

Access Anxiety 12 


Equipment Leasing 1 1 

A set cost and a more established upgrade cycle 
are two significant advantages leasing provides. 
However, administrators should also be aware of 
the disadvantages that come with leasing equip- 
ment and have plans in place to minimize them. 

Extending The Data Center Life Cycle | 23 

Nobody has been promised a fat, carefree bud- 
get for the rest of 2008. That means data center 
managers must look for ways they can extend 
the life cycle of their current data centers. 

Avoiding Vista? | 24 

Many analysts thought that the reason Vista had 
yet to take off was because most IT departments 
were waiting for SP1 to banish any bugs or securi- 
ty weaknesses typical in the first iteration of any 
new operating system. But is that really the case? 

High-Density, High Cooling | 25 

The latest hardware has certainly made it much 
easier to pack a lot more horsepower in a small- 
er package, but more power means more heat. 

Product Releases 1 17 

■ Citrix XenServer 5, the latest in a line of server 
virtualization products, is now available from 
Citrix Systems. ■ A new line-interactive UPS 
from Eaton is targeted toward IT assets such as 
switches, routers, servers, VoIP devices, and 
workstations. ■ GSX launched the GSX Monitor 
V9, a new version of its server monitoring and 
reporting solution. ■ New from iStor Networks 
are lOGbps and IGbps Ethernet iSCSI storage 
products with the integraSuite/MC Management 
Center. ■ porttracker announced porttracker 
v2.0, its new network management appliance 
that allows network managers to track and report 
on devices currently or previously connected to 
their networks. ■ Proginet released Slingshot 
Vault, its solution to manage the space, security, 
and bandwidth challenges associated with email 
attachments. ■ Staco Energy Products re- 
leased its UniStar P series single-phase online 
UPSes in tower designs. ■ Unisys released 
new software for the Unisys Infrastructure Man- 
agement Suite. 


Upcoming IT Events 4 Product Releases 17 

Marketplace News 4 Six Quick Tips 26 

Products At Work 5 What's Happening 27 

Product Of The Week ..16 Three Questions 27 

The home page is updated each week with 
new articles and hardware news to help you keep current. 
Visit today. 

Page 2 

September 26, 2008 

Subscribe Today/Address Change Form -iTel^nl^^^^ 


Phone: ( ) Fax: ( ) 
Contact Name: 

© Copyright 2008 Sandhills Publishing Company. 
All rights reserved. 

Company Name: 


City: State: Postal Code: 

Email: Web Address: 

Subscriptions: (800) 819-9014 
Subscriptions Local: (402) 479-2132 
Subscriptions Fax: (402) 479-2193 
Mail Form To: 

1 . What is the size of your company 3. What is your annual computer hardware/ 
(how many employees)? software purchasing budget? 

□ Less than 10 □ 200 to 499 □ $0 to $9,999 □ $100,000 to $249,999 

□ 10 to 99 □ 500 to 999 □ $10,000 to $24,999 □ $250,000 to $499,999 

□ 100 to 199 □ 1,000+ □ $25,000 to $49,999 □ $500,000 to $999,000 

1 — 1 <ic;n nnn +r\ <^oo ooo i — i <ii nnn nnn i 
U v>OU,UUU TO v>yy,yyv U v> l,UUU,UUU+ 

2. How often do you purchase computer 

□ Weekly □ Quarterly 

□ Bi-weekly □ Annually 

□ Monthly □ No Involvement 

P.O. Box 85518, Lincoln, NE 68501-5518 
Overnight Delivery: 

120 West Harvest Drive, Lincoln, NE 68521 

Networking & VPN 

September 26, 2008 

Shavilk NetChk Protect 6.5 is an easy-to-use 
security management tool that can keep your 
assets, both physical and virtual, up-to-date 
with the latest patches and security fixes. 

$5,200 for 100 seats 

(800) 690-6911 


Simply Secure. 

Manage Your Resources With Ease 

Shavlik NetChk Protect 6.5 

Virtualization is a godsend for the enterprise. 
Along with green IT practices, virtual computing 
can reduce costs through greater efficiency and 
energy savings. On the other hand, if your 
organization relies on IT workers to manually 
patch, secure, and maintain the network- 
especially in the more complex environment of 
a virtualized data center— your costs might be 
rising rather than dropping. 

Shavlik says that its NetChk Protect 6.5 en- 
terprise security management tool is the first to 
automatically roll out patches and eliminate 
unwanted software from not only physical 

systems and online virtual machines but also 
from offline virtual machines, as well. The soft- 
ware seeks out and discovers offline virtual 
assets to ensure that they are kept up-to-date, 
giving your company the ability to demonstrate 
due care for regulatory compliance purposes. 

NetChk Protect 6.5 operates with either an 
agent-based or an agentless architecture, 
according to your organization's needs. It auto- 
matically identifies Windows applications and 
operating systems, determines whether updates 
are available, and rolls out necessary patches. 
It can discover and fix security risks such as 

malware and misconfigured systems, too, with 
its Active Vulnerability Management capabilities. 

Shavlik's software also offers flexible customiza- 
tion through its Any Patch, Anywhere Technolo- 
gy. A wizard-like editor lets you create custom 
patches to meet your network's specific needs. 

The result is faster, more effective security and 
management of a mixed environment, all 
through a single console with an easy-to-use 
interface. With Shavlik's NetChk Protect 6.5, 
your organization may begin to realize more of 
the savings virtualization can offer. 


September 26, 2008 

Rugged Mobile Computing 

Intermec CK3 

Every enterprise seeks to lower expenses 
and streamline business practices; for data 
capture and communication applications, 
Intermec has introduced the CK3 mobile 
computer to facilitate these improvements. 

Primarily intended for warehouse opera- 
tions, the handheld CK3 incorporates a 
number of features designed for highly 
adaptable data, image capture, and secure 
wireless capabilities. The CK3 includes ID 
and 2D barcode scanning, which can be 
accomplished either up close or far away, 
regardless of the lighting situation. It can 

also scan damaged or low-quality barcodes. 

The CKS's wireless features include an 
802.11a/b/g wireless LAN with CCX (Cisco 
Compatible Extensions) certification and 
support for VoIP and Bluetooth. Other fea- 
tures include speech recognition, an option- 
al RFID reader, and support for integration 
with Intermec's PB42 receipt printer, PB50 
label printer, and other mobile printers. 

Intermec's TE 2000 and i Browse software 
come packaged with the CK3, which oper- 
ates on the Windows Mobile 6.1 platform. 

TE 2000 uses terminal emulation and sup- 
ports multiple host sessions, security, ses- 
sion persistence, and a complete set of 
data collection options. iBrowse is a data 
collection browser that does the job yet lim- 
its users to only preapproved Web sites. 

With Intermec's SmartSystems technology, 
users can streamline IT tasks and reduce 
costs by installing software, configuring set- 
tings, and remotely connecting to the net- 
work. The CK3 also has several accessories 
including docking stations, an attachable 
handle, and an IP30 handheld RFID reader. 

The Intermec CK3 is a rugged, 
handheld mobile computer 
designed for industrial-class 
applications, data capture, 
and communication. 


(800) 755-5505 


Networking & VPN 

September 19, 2008 

Virtual Server I/O 

Easily Monitor & Manage 
Witli Xsigo's VP780 I/O Director 

There are a lot of disadvantages to 
using multiple cards, cables, and switches 
for server input and output. With each 
additional device and connection, it 
becomes harder and harder to manage 
data, deploy applications, and utilize serv- 
er resources. However, with Xsigo's 
VP780 x2 I/O Director — the next genera- 
tion of its virtual resource hardware and 
software architecture — you can use virtual 

30 ^ ^ o <*a ^ Oi'Sl 


resources in place of physical cards and 
unified fabric to replace multiple cables. 

The VP780 x2 I/O Director delivers 
20Gbps of bandwidth to each server and lets 
users monitor and control their I/O topology 
in real time from a single view that extends 
from the virtual machines to the physical 

switch ports. The new I/O Director lets you 
access traffic statistics from third-party tools 
for enhanced performance monitoring. 
Improved SAN and iSCSI boot capabilities 
allow users to boot any server from any 
Fibre Channel or iSCSI LUN for quick redi- 
rection of server resources. The VP780 x2 
I/O Director also includes role-based access 
control to maintain existing lines of man- 
agement demarcation. 

By replacing fixed resources with con- 
veniently managed virtual resources, IT 
staff can move connectivity from one serv- 
er to another within about 30 seconds 
without requiring any recabling. The Xsigo 
VP780 x2 offers scalable storage and net- 
work connectivity, and its high-speed, 
low-latency, hardware-based design lets 

you maintain I/O identities, even though an 
I/O migration. The Xsigo VP780 x2 I/O 
Director is a 4U-high unit that will interop- 
erate with your existing servers, storage, 
and networking equipment. 

Xsigo Systems VP780 x2 I/O Director 

Starts at $30,000 

Virtual resource hardware and software architecture 
that lets you monitor and manage your server I/O topol- 
ogy in real time from a single view 

(408) 329-5600 



September 26, 2008 

Page 3 

1 Security 

September 26, 2008 

1 Networking & VPN ^^^^^H 

September 19, 2008 

Difectory . Onyit 

B 1 imtoy.HiMlB.ani ^ 

aiC>tni$*'.^ MSuifHKJS 



S H«:r™lt WTntewi 5«mr 5M5. IiMmi- 

e>id He 

« **VI 

I4t«a Dnwwm tunn SiAmn 

idTfiw ' StinnnM CompUMnn* 

Embotics V-Scout is a 
free tool for gathering 
and managing 
information from 
VIVIware VirtualCenters 


(704) 770-6666 

Simplified Management, Effective Oversight & VMware Reporting 

Embotic's V-Scout 

Time is of the essence, and rarely is it more 
so tlian for IT and data center professionals 
who have workers depending on them. 
Embotics offers V-Scout as a solution to the 
problem of time spent collecting and collating 
information from VMs. V-Scout is free, agent- 
less, and can start working for you minutes 
after you download it. 

V-Scout is designed to save users the time 
spent gathering, formatting, updating, and 
reporting on VMs in VMware VirtualCenter- 
enabled environments and provide adminis- 
trators a single, centralized management 
source. Without V-Scout managing the infor- 
mation from multiple VirtualCenters requires 
manual effort; limited filtering, searching, and 
reporting can be tedious; and it can be difficult 
to track custom VM information. 

Features of V-Scout include aggregation of 
data from up to two VMware VirtualCenters, 
online and offline VM discovery, automatic 
VM tracking, up to 10 custom attributes, and 

an unlimited number of reports. Types of 
reporting include VM population trending 
reports, guest OS inventory reports, host 
inventory reports, managed system inventory 
reports, VM inventory reports, and virtual 
infrastructure summary reports. 

Reports offer information such as historical 
growth, costs, trend protection, the number of 
running and total VMs, and templates for each 
type of guest OS in table form. Other provided 
information includes sums and averages for 
host inventory and each VirtualCenter being 
managed, detailed inventory information for a 
VM, and summaries of information by Virtual 
Infrastructure versions in table form. 

Ideally, V-Scout helps companies assess virtual- 
ization deployments and gain control over their 
infrastructure. Further, V-Scout is designed to 
help companies prevent virtual sprawl by provid- 
ing centralized management options. 

^ embotics 

K ntyte gjj ^ ^ Ife M 


mm F 


ingiBBiB I B 





Global DataCenter 
Management nlyte® 5.0 helps you 
visualize, monitor, optimize, and 
model complex data center 

(866)949-GDCM (866-949-4326) 

Drive Down Data Center Costs 

Global DataCenter Management nlyte® 5.0 

Data Center operating budgets have been hit 
hard as energy costs continue to rise. The 
complexity of the data center and the interrela- 
tionships between the assets and the applica- 
tions they serve demands a management 
solution that understands the current state of 
the environment and provides the ability to 
plan and model for future needs. 

Built by data center professionals for data cen- 
ter professionals, the nlyte® suite from GDCM 
(Global DataCenter Management) optimizes 
data center assets by visualizing, monitoring, 
and modeling current and planned changes to 
this critical infrastructure. The software pro- 
vides immediate feedback on planned and im- 
plemented changes to facilities, racks, servers, 
cabling, power connections, and other assets 
and resources. With a few clicks, nlyte can sup- 
ply users with the data they need to identify im- 
portant trends or analyze how planned 

changes will impact redundancy power, cool- 
ing, space, network, and cable capacity 

The nlyte suite's auto-allocation capability re- 
moves the guesswork of finding the best rack 
for new server placement and, in many cases, 
can recover unused rack capacity, delaying or 
eliminating the need to expand the existing fa- 
cility. The nlyte workflow module can help es- 
tablish standard policies and procedures for 
data center operations, reducing implementa- 
tion time and eliminating costly mistakes. 

Companies using nlyte are seeing significant 
reductions in costs related to power, space, 
and human capital, with an ROI of less than 
12 months depending on installation's size. 


Networking & VPN 

Septemer 19, 2008 

Networking & VPN 

September 19, 2008 

High-End Computing Goes Virtual 

vSMP Foundation™ Aggregation Platform 

For IT organizations that find high-end servers 
too expensive and are fed up with the complexi- 
ties of setting up and managing clusters, there is 
a new innovative technology on the market that 
can solve these user problems. 

The innovative Versatile SMP™ (vSMP) architec- 
ture from ScaleMP aggregates multiple industry- 
standard x86 systems into a single virtual 
system, delivering a high-end SMP computer. 
The ScaleMP vSMP Foundation aggregation 
platform creates virtual systems ranging from 
four to 32 processors (128 cores) and up to 1TB 
of shared RAM. It is optimized for compute- and 
memory-intensive workloads, making it ideal for 
the high-performance computing market. It pro- 
vides a single virtual system across multiple 
nodes of a cluster or blade server system, dra- 
matically simplifying installation and ongoing 
management. It delivers the operational simplicity 
of traditional SMP systems while maintaining the 
low acquisition costs associated with clusters. 

The ScaleMP vSMP Foundation Standalone soft- 
ware can be used to run extremely large jobs, 
models, and simulations, even with a single 
process; with up to 1TB of RAM, it fits most of the 
large simulations in the industry By providing up to 
128 cores of processing power, parallel applica- 
tions significantly improve performance and run 
time; they use different parallelization models such 
as threaded, OpenMP, and MPI with the highest 

vSMP Foundation Standalone is used in a range 
of high-performance and technical computing 


Virtual Machine 



VMM 1 




Applications requiring SUp6rS6t 
of the physical server resources 

ScaleMP vSMP Foundation Standalone 
aggregates multiple x86 systems into a single 
virtual system 

(877) MAX-VSMP (877-629-8767) 


Extend Your Copper 
Network's Reach 

Transition Networks IVIedia Converter Offers Solid Option 

port on the MCM converts a Gigabit 
Ethernet lOOOBase-T signal-, transmitting 
over copper-, to a lOOOBase-SX signal-, 
transmitting over fiber. Media 
Conversion Modules are powered by 
redundant power supplies. An optional 
remote management module is also avail- 
able to alert network managers of a power 
supply failure or fan fault. 

Whether using two modules in the lU 
housing (24-port capacity) or up to eight 
modules in the 4U housing (96-port 
capacity), the MCM provides the highest 
density media conversion solution avail- 
able. Using the Media Converter Module 
lets you reap all the benefits of installing 
a modular MTP connector-based fiber 
cabling system, while leveraging your 
existing copper-based electronics. 

Transition Networks 

Plug & Play Universal Systems 

Media Converter Module 

Lets you take advantage of fiber-optic infrastructure 
while using existing copper electronics 

(800) 526-9267 

Are you looking to extend the reach of 
an existing copper network? Trying to 
alleviate copper cabling congestion? 
Addressing EMI/RFI interference within 
your data center? 

The Plug & Play Universal Systems 
Media Converter Module from Transition 
Networks lets you gain all of the benefits 
of a fiber-optic infrastructure and the 
advantages of a preterminated, modular 
solution, all while using the low-cost lega- 
cy copper electronics currently available. 

A jointly marketed venture between 
two industry leaders — Transition Net- 
works and Corning Cabling Systems 
— the Plug & Play Universal Systems 
MCM (Media Converter Module) is a 
Gigabit Ethernet (lOOOBase-SX) media 
conversion solution within a Plug & Play 
Universal Systems. Each Media 
Converter Module is configured with 12 
modular RJ-45 ports on the front and two 
MTP Connector ports on the back. Each 



Page 4 



^ I SanDisk Rejects Takeover Bid 
^ From Samsung 

SanDisk has rejected a nearly $6 
billion takeover offer from Samsung, claim- 
ing that the $26-per-share offer undervalued 
the company. SanDisk, maker of flash mem- 
ory products, including USB memory drives 
and digital audio players, may still be look- 
ing at a hostile takeover from Samsung or a 
competing bid from Toshiba, the world's 
second largest maker of NAND memory 
chips. Samsung, the world's largest maker of 
NAND memory chips, reportedly now pays 
SanDisk about $350 million a year to use its 
patented technology. The company's $5.9 
billion takeover offer reportedly represented 
about a 70% premium over SanDisk' s recent 
closing stock price. 

I Senator Questions Text IVIessaging Rates 

U.S. Senator Herb Kohl of Wisconsin 
has launched an investigation into the rea- 
son behind text messaging rate increases. 
Kohl, head of the Senate Judiciary 
Committee on Antitrust, Competition 
Policy, and Consumer Rights, sent letters to 
top executives at the four largest wireless 
service providers. In the letters. Kohl points 
out that consumers are paying more than 20 
cents per text message today, up from 10 
cents in 2005. The latest price increases, 
according to Kohl, appear to have hap- 
pened at about the same time, when the 
number of U.S. wireless service providers 
consolidated from six to four. Kohl says the 
fact that providers are raising prices goes 
against the "vigorous price competition we 
hope to see in a competitive marketplace." 

I Gartner Studies IT'S Green Efforts 

A RECENT Gartner study has revealed that 
most IT users are lacking the complete pic- 
ture when it comes to environmentally 
friendly technology and how best to pursue a 
greener future. In its study, Gartner offers an 
outline for the immediate, midterm, and 
long-term issues to keep in mind. According 
to the research firm, some of the immediate 
green IT concerns should include looking 
into advanced cooling technologies and use 
of modeling and monitoring software. Some 
midterm issues to focus on over the next two 
to five years include green IT procurement, 
videoconferencing, green legislation in data 
centers, and corporate social responsibility 
programs. Long-term goals should include 
carbon offsetting and carbon trading, data 

center heat recycling, alternative energy 
sources, and green building design. 

I Tech Groups IVlay IVIerge 

Two TECH GROUPS that focus on tech lobby- 
ing, policy advocacy, and business develop- 
ment are in talks to merge. The ITAA 
(Information Technology Association of 
America) and the AeA (formerly known as 
the American Electronics Association) want 
to merge their memberships and programs to 
provide "a stronger voice for the technology 
industry," according to a statement. AeA and 
ITAA members include industry leaders in 
all segments of the technology industry; 
members of a combined group would benefit 
from greater efforts in terms of lobbying, 
business and capital development, and 
research, according to the groups. 

I Apple Settles Backdating Suit 

Apple CEO Steve Jobs and several other 
Apple executives and board members have 
settled a stock option backdating lawsuit 
filed by shareholders. The suit, which was a 
combination of 16 separate lawsuits 
merged into one in 2006, alleged that 
Apple officials falsified documents related 
to several stock option grants. Because of 
the unique nature of the lawsuit — share- 
holders suing on the company's behalf — 
the $14 million settlement will be paid to 
Apple by insurers. The settlement requires 
that Apple pay plaintiff attorney fees and 
expenses, which amounted to more than $8 
million. In addition, Apple's Board of 
Directors must create new rules governing 
stock options given to employees. 

I Vangent Names Jim Reagan As CFO 

Vangent, a global provider of consulting, 
systems integration, human capital manage- 
ment, and strategic business process out- 
sourcing services, named Jim Reagan as its 
new senior vice president and chief financial 
officer. In this role, Reagan will lead 
Vangent' s finance, contracting, pricing, and 
Sarbanes-Oxley compliance activities. Prior 
to this announcement, Reagan served as 
executive vice president and CFO of Deltek. 
While at Deltek, Reagan helped raise $162 
million through the company's initial public 
offering. He also worked to transform the 
company into a Sarbox-compliant organiza- 
tion. Some of Vangent' s clients include 
Centers for Medicare & Medicaid Services; 
the U.S. departments of Defense, Education, 
Health and Human Services, and Labor; and 
several Fortune 500 companies. 

I Google Chrome Takes Share 

After its second week, use of Google's 
Chrome browser peaked at 0.85%, according 
to Net Applications. Chrome's increase in 
share comes at the expense of Microsoft' s 

WATCH THE This information provides a quick glimpse of current and historical stock 
1^^^^ J^l^ prices and trends for 14 major companies in the technology market. 



Year Ago 

Sept. 12$ 

Sept. 19$ 

% change from 
previous week 






T 6.96% 

Computer Associates 





A 0.14% 

Cisco Systems 





A 2.34% 






T 10.5% 






A 1 .93% 






A 3.21% 


















A 3.98% 












A 2.5% 

Red Hat Software 





T 0.54% 

Sun Microsystems 





T 9.48% 






T 3.4% 

NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. 

Internet Explorer, Mozilla Firefox, and 
Opera; each has watched its market share 
drop in the past 14 days. Apple's Safari 
browser is the only browser unaffected 
by Chrome's release; its share increased 
by 0.7%. As Chrome and Safari continue to 
square off, some sources say that Safari 
might borrow some of Chromes features, 
even though Chrome currently draws on 
multiple aspects of Apple's WebKit engine. 

I Social Networking Adoption Plans Lag 

found that more than two-thirds of those sur- 
veyed have no official plans to integrate 
blogs, wikis, instant messaging, and other 
social networking tools. More than 60% of 
the senior executives and IT staff surveyed 
indicated that management is resisting adop- 
tion out of fear that the tools will sap worker 
productivity. The survey also found that 
many social media technologies have been 
secretly worked into corporate environments, 
but only 18% of companies have formal 
plans for managing the use of social media. 

I HP To Reduce Workforce 

With its acquisition and integration of 
EDS (Electronic Data Systems), HP 
announced that it will be reducing its 
workforce by about 24,600 employees 
over the next three years. The reduction 
makes up about 7.5% of all HP and EDS 
employees, and about half will be from the 
United States alone. HP CEO Mark Hurd 
says that once the program is completed, 
HP will be a bigger, stronger company and 
will save about $1.8 billion. HP says it 
will provide laid-off employees severance 
packages that include counseling and job 
placement services. 

I Convicted Spammer Goes Free 

The Virginia Supreme Court has struck 
down an antispam law, ruling that the law 
was unconstitutionally overbroad and that it 
violated First Amendment rights to free 
speech. The law, enacted in 2003, barred the 
sending of anonymous emails related to pol- 
itics and religion. The decision came in the 
case of Jeremy Jaynes, who was convicted 
as a felon under Virginia's antispam law in 
2004. He sent between 10,000 and 12,000 
unsolicited emails in a 24-hour period using 
false transmission information. The court 
subsequently overturned Jaynes' conviction. 

I Nvidia Trims Its Workforce 

On the heels of its successful Nvision 08 
conference, graphics giant and chipset 
manufacturer Nvidia announced plans to 
lay off about 360 employees worldwide, or 
roughly 6.5% of its personnel, by Oct. 26. 
Severance packages, job placement assis- 
tance, and counseling will lead to a $7 to 
$10 million pretax charge against operat- 
ing expenses in the company's third fiscal 
quarter. Despite a high-performance prod- 
uct lineup, Nvidia is facing tougher compe- 
tition from rivals AMD and Intel and is 
addressing packaging defects in some or 
all of its recent graphics products. 

I Oracle Reports Strong Revenue Growth 

Oracle reported a first-quarter net 
income of $1.1 billion, up 28% compared 
to a year ago. Overall revenues were up 
18% year-over-year to $5.3 billion. Sales 
numbers were also positive, with software 
revenues up 20% to $4.2 billion, new soft- 
ware license revenues up 14% to $1.2 bil- 
lion, license updates and software support 
revenues up 23% to $2.9 billion, and rev- 
enue from services up 9% to $1.2 billion. 
Oracle President Charles Phillips says the 
solid revenue growth shows that more and 
more Oracle database customers are using 
Oracle's integrated product suite to mod- 
ernize their computing environments. 

September 26, 2008 

Upcoming 1 1 myiaiiiaJ 

Are you looking to learn more about data center 
or IT topics? Network with some of your peers? 

Consider joining a group of data center 
professionals. If you don't see a meeting listed in 
your area, visit,, 
or to find a chapter near you. 


AITP Akron 
September 30, 6 p.m. 
Lindsay's Amber Restaurant 
1500 Canton Road 
Akron, Ohio 


ITEC St. Louis 
October 1-2 
St. Louis, Mo. 

AFCOM Central Texas 
October 2, 11:30 a.m. 
Marie Callender's Restaurant 
9503 Research Blvd. 
Austin, Texas 

ISSA Mankato 
October 2, 1 p.m. 

Alltel Wireless 
200 Technology Drive 

Mankato, Minn. 

ISSA Central Plains 
October 3, 1 p.m. 
SKT Business Communications Solutions 
3rd Floor 
125 N. Emporia, Suite 100 
Wichita, Kan. 

Data Center World Fall 2008 
October 5-8 
Orlando, Fla. 

ITEC Ft. Lauderdale 

October 7-8 
Ft. Lauderdale, Fla. 

AITP Central Idaho 
October 8, 11:45 a.m. 
The Owyhee Plaza 
1109 Main SL 
Boise, Idaho 

ISSA Baltimore 
October 8, 4:30 p.m. 
Sparta Inc. 
7110 Samuel Morse Drive, Suite 200 
Columbia, Md. 

Detroit SecureWorld Expo 
October 8-9 
Detroit, Mich. 

AITP Nashville 
October 9, 5:30 p.m. 
Holiday Inn-Brentwood 
760 Old Hickory Road 

Brentwood, Tenn. 

AITP Washington, D.C. 
October 9, 6:30 p.m. 
Alfio's Restaurant 
4515 Willard Ave 
Chevy Chase, Md. 

Gartner Symposium/ITxpo 
October 12-17 
Orlando, Fla. 8/sym1 8.jsp 

Do you have a new product that data center/IT 
managers would be interested in learning about? 
Call (800) 544-1264 or email 


(800) 819-9014 
(402) 479-2170 

Advertising & Reprints 

(800) 247-4880 
(402) 479-2141 
FAX: (402) 479-2193 

Editorial Staff 

131 W. Grand Drive • Lincoln, NE 68521 
FAX: (402) 479-2104 

September 26, 2008 



Page 5 

Campus Security 

Ql Labs' QRadar Helps Wayne State 
Keep Its Network Secure 

by Robyn Wei smart 

Like other large universities, Wayne 
State University, a Detroit-based institution 
of over 30,000 students, faces security 
complications that the average enterprise 
can sidestep. 

"We are required to keep an open net- 
work to [allow for the] free flow of infor- 
mation. We cannot block certain things 
because it would hinder student as well as 
administration connections," says Gray don 
Huffman, senior systems security specialist 
at Wayne State ( "For 
example, we would like to block IRC traf- 
fic, and most corporate organizations don't 
need IRC, but in a university environment, 
IRC traffic is in some cases essential to 
some research development." 

But this sort of openness leaves the uni- 
versity's network with a vulnerability that 
enables bot-control networks to take advan- 
tage of it and communicate with zombie 
computers, among other things, says 

Meanwhile, like any organization in this 
economy, Wayne State is dealing with lim- 
ited resources. "Most budgets today are 
going to remain flat, so given the chal- 
lenges security officers continue to face, 
you're looking for products that can pro- 
vide your limited staff with powerful tools 
to assist in doing your job," says Morris 
Reynolds, director of information security 
at Wayne State. 

Despite these circumstances, both 
Reynolds and Huffman have found an 
effective means of centralizing and monitor- 
ing the security of the university's network: 
Ql Labs QRadar ( Both 
agree that their choice was the right one. 
"Definitely I would say anyone in the secu- 
rity field should be using it," Huffman says. 

Campus Security Drivers 

According to Reynolds, the primary 
security drivers leading to Wayne State's 

implementation of QRadar were trying to 
determine how the university could best 
manage the wide variety of responsibilities 
it has in monitoring traffic activity and 
keeping an eye out for suspicious activities 
across the institution's network, especially 
given its limited budget. 

Huffman concurs: "We needed 
a package that allowed us to look 
at all different types of events 
coming from any application we 
had on campus, such as our fire- 
walls, any domain controllers, and 
our authentication servers, and 
correlate these events so that if 
something happened to one de- 
vice and it was seen again on another 
device, a flag would be issued." 

In addition, Huffman and Reynolds also 
needed a solution that could centralize the 
traffic going across the network and help 
them prioritize the order in which events 
needed to be addressed and notify staff of 
the actions that would have to be taken. 

The Whole Package 

According to Huffman, Wayne State's net- 
work security solution needed to offer both 
Layer 7 (application-level) traffic analysis 
and traffic correlation to events. "A lot of 
products out there either have the traffic anal- 
ysis but don't have the event correlation or 
vice versa, but QRadar was the only product 
that had the whole package," Huffman says. 

Huffman says that QRadar' s ability to 
notify IT of unique events rather than 
requiring IT to slog through, say, 200 indi- 
vidual packets of data was a boon. "In 
looking at and maintaining months' worth 
of data, QRadar significantly cuts down on 
the amount of space you need to provide," 
Huffman says. 

In addition to solving the aforementioned 
security drivers, QRadar has given the uni- 
versity a significantly broader view of activ- 
ities throughout the network, something nei- 
ther he nor Huffman had anticipated up 

front, Reynolds says. "With the university 
being as widespread as it is, our ability to 
really incorporate or integrate all of the 
event logs into our portfolio allows us to 
review any sort of suspicious traffic and 
look for patterns or signs of attack, some- 
thing we did not have previously." 

Moreover, QRadar also lets Reynolds and 
Huffman know which network devices are 
incorrectly configured. According to Huff- 

man, QRadar performs a benchmark of its 
network over the space of a month and will 
notify IT if it discovers anything unusual. 

"Let's say a system is not configured cor- 
rectly, and it is trying to do a bunch of 
ICMP traffic outbound onto the network. 
QRadar will notify and let you know some- 
thing weird is going on. You have a look 
at it, and lo and behold, [you find out] 
something that should have been shut off 
wasn't," says Huffman. 

Reasonable Price, Great Service 

Huffman says that QRadar' s cost fell in 
the middle of the price range for security 
solutions of this nature. Additionally, 
QRadar does not have the storage require- 
ments that some seemingly less expensive 
solutions have. 

What's more, Huffman rates Ql Labs' 
customer service and support as "second to 
none," adding that he has never before 
experienced the sort of customer service 
that Ql has provided in support of QRadar. 

"Any time I have an issue, I call them up, 
and it's usually resolved within the hour," 
says Huffman. "Just in talking to their sup- 
port staff, every single one of them is 
extremely knowledgeable on the product, 
which is very difficult to find these days." 

For his part, Reynolds says that Ql's 
flexible software and tech support has 
allowed Wayne State's IT department to 
react quickly to changing business require- 
ments both from its side and from what he 
and Huffman see out on the network. 

Off You Go 

Huffman says implementation of QRa- 
dar was quick. "It was basically plug and 

play — put the servers in [and] do a couple 
of quick configurations on the setup, 
where it asks you maybe 10 to 15 ques- 
tions, reboot your server, and off you go. 
The results are pretty much instanta- 
neous," he says. 

Between QRadar' s ease of use, excel- 
lent service, and the results it provided 
Wayne State's network, Huffman and 
Reynolds were motivated to migrate from 
a standalone deployment to a distributed 
one in August. "We just started throw- 
ing everything we could at [QRadar], and 
we just saw the amount of usefulness 
we were getting out of it, and we could 
hardly wait to throw more stuff at it, 
so we had to expand," Huff- 
man says. 

Huffman points out that 
QRadar will not reduce the 
amount of time you spend 
doing your job. However, 
QRadar will put an end to 
having to root through a 
whole bunch of logs, trying to 
figure out what has been 
occurring on the network and possibly 
discovering that traffic you were examin- 
ing was bona fide. QRadar also will mini- 
mize time spent checking out false posi- 
tives so that you no longer have to go 
individually to each one of your systems 
looking for bugs and then trying to make 
heads or tails of it, says Huffman. 

"And QRadar will allow you to see a lot 
more of what' s going on [in] your network, 
so the time that was spent looking at all 
those events will now be spent taking care 
of the actual problems that you have," 
Huffman says. tM 

Ql's flexible software and tech support lets 
Wayne State's IT department react quickly to 
changing business requirements both from its 
side and from out on the network. 

Ql Labs 
I QRadar 

Provides users with an effective way to moni- 
tor and secure network traffic and integrates 
threat management, log management, and 
compliance management over a wide range 
of supported devices; can be used in single 
or distributed deployments 

"A lot of products out there either have the 
traffic analysis but [not] the event correlation 
or vice versa, but QRadar was the only prod- 
uct that had the whole package," says Gray- 
don Huffman, senior support and security 
analyst at Wayne State University (www 



September 19, 2008 

A Touch Of The Future 

Tyco Electronics Brings Touchscreen 
Capabilities To High-Traffic Environments 

Touchscreen technology is a powerful 
way to aid in carrying out tasks. Tyco Elec- 
tronics has introduced two products de- 
signed to push the touchscreen envelope 
further, making it more useful for business- 
es and easier to use for consumers. 

The Elo TouchSystems 1900L and 2200L 
are high-resolution LCD touch monitors 
with zero-bezel design and wide aspect 

ratios, which enable the entire surface of the 
monitors to be used for screen space. 

The Elo TouchSystems screens employ 
APR (Acoustic Pulse Recognition) tech- 
nology, which works by recognizing the 
sound of a stylus touching the screen and 
reacting accordingly. Therefore, virtually 

any stylus can be used to manipulate items 
on the screens — a fingertip, a capped pen, 
the edge of a credit card, and so on. 

Designed to last a long time with mini- 
mal maintenance, the screens feature zero- 
drift performance so they don't ever need 
to be recalibrated. The glass surface fea- 
tures optimal optical quality, durability, 
and stability and is designed for excellent 
dragging capabilities. Designed for use in 
high-traffic environments such as retail, 
hospitality, and public places, the glass is 
resistant to water, dust, and grease. 

The screens also feature built-in, down- 
ward-facing speakers that save space and 
maintain the all-screen appearance. The 
stand is adjustable and can be mounted on 
a desktop or a wall. Other features include 

integrated VGA and DVI ports, touch- 
interface USB (APR) and serial jacks, 
AC/DC power, and a headphone jack. 
Other manipulation buttons are located on 
the side of the devices to help prevent 
unintentional user disruptions. 

Tyco Electronics Elo TouchSystems 

Zero-bezel, dirt- and grease-resistant toucliscreens 
designed for durability and functionality in high-traffic 


(650) 361-4800 

Tyco Electronics 

Our commitment. Your advantage. 

Page 6 

September 26, 2008 

Networking & VPN 

September 19, 2008 

Networking & VPN 

September 19, 2008 

Extensive Virtual 

up.time 5 Optimizes Performance, Capacity & Availability 


5's enterprise-wide dashboards 
let you centrally manage your entire infrastructure. 

ViRTUALiZATiON HAS promised to help 
companies maximize their infrastructure 
investments while minimizing hardware 
and labor costs. So far, companies are 
saving on hardware, however more sav- 
ings are available through better virtual 
systems management. 

uptime software's up.time 5 is enter- 
prise systems management software 
with virtual management and monitoring 
that optimizes virtual performance, 
capacity, and availability across all vir- 
tual technologies (VMware, AIX 
LPARs, Solaris Zones). With up.time 5, 
you can easily plan, manage, and moni- 
tor your virtual infrastructure. 

Enterprise-wide dashboards let you 
centrally manage an entire global 

infrastructure across environments 
(physical and virtual technologies), plat- 
forms, applications, services, and data- 
bases, up.time can be quickly deployed 
as a standalone solution or integrated 
with existing tools and frameworks in 
the IT stack. 

up.time provides IT managers with the 
insight to more effectively manage their 
distributed applications and global ser- 
vices levels, as well as maximize enter- 
prise-wide IT resources, up.time's cross 
domain, cross datacenter, and role based 
real-time dashboards provide system 
administrators with the necessary tools to 
better monitor the performance and avail- 
ability of both their physical and virtual 
environments from a single centralized 
console, uptime software focuses on pro- 
viding a unique client experience through 
a flexible engagement approach. 

uptime software's up.time 5 

30-day risk-free trial available 

Systems Management software for SMB and 
Enterprise Companies 

(416) 868-0152 


v!^ up.times 

Physical Infrastructure 

September 19, 2008 

Simulate Data Center 
Cooling Performance 

TileFlow Helps You Meet Cooling Challenges 

rated tiles and other sources, 
and airflow and temperature 
map in the above-floor space. 
With TileFlow, you no longer 
need to go through the expen- 
sive and tedious trial-and- 
error process to improve cool- 
ing. Data center managers, 
engineering and architectural 
firms, equipment manufactur- 
ers, and consulting companies 
can benefit from TileFlow. 
With TileFlow you can: 

• Design highly efficient data centers 

• Prevent heat-related outages of comput- 
er equipment in existing data centers 

• Save on the initial and operating costs 
of cooling units 

• Streamline installation and commis- 

• Make cost-effective investments in 
purchasing cooling-related hardware 

Innovative Research TileFlow 

Uses computational fluid dynamics to model airflow 
motion and temperature distribution inside data centers 


In this age of increasing server heat 
loads, proper cooling of server racks is a 
new challenge for data center managers. 
The key to reliable cooling in a data center 
is to meet the cooling air requirement of 
each server rack and to ensure an accept- 
able inlet temperature. There are many 
cooling solutions available, and choosing 
the right one that meets the practical and 
budgetary restrictions is not always easy. 

TileFlow software is designed to help 
you in analyzing the cooling performance 
of an existing data center, identifying the 
causes of cooling problems and rectifying 
them, studying failure scenarios, planning 
for future upgrades, and designing cooling 
systems for new data centers. 

TileFlow gives the pressure distribution 
under the floor, the airflow through perfo- 

Innovative Research, Inc. 

A Computational Fluid Dynamics Company 

Regain Control 
Of Virtualization 

BMC Introduces New Comprehensive Management Tools 




BMC Capacity Management eliminates guesswork by providing 
assessment, prioritization, and capacity monitoring capabilities, 

Without a comprehensive virtualiza- 
tion management solution, enterprises 
could face decreased revenue, dissatisfied 
customers, and diminished reputation. 

BMC Software released nine new virtu- 
alization tools to help customers reach 
performance goals and increase compli- 
ance and visibility by addressing the key 
issues caused by virtualization. 

BMC Virtualization Capacity Manage- 
ment and Planning Service helps organi- 
zations get started, regardless of their 
experience planning virtualization and 
consolidation programs. Application 
Performance and Analytics provides 
thresholds to keep service levels consis- 

tent. BMC Performance Man- 
agement monitors virtual in- 
frastructure and applications. 

BMC BladeLogic Virtuali- 
zation Module for Servers 
increases security and boosts 
licensing and regulatory com- 
pliance. Customers have auto- 
mated, closed-loop change 
and configuration control over 
their virtualized environment 
with BMC BladeLogic Opera- 
tions Management Suite. 

Other new tools include 
Capacity Management, Dis- 
covery Solution, Run Book 
Automation Platform, and Run Book 
Automation VMware Adapter. Each of 
the new virtualization tools works with 
both virtual and physical environments to 
increase simplicity while reducing costs. 

BMC Software Virtualization Tools 

Nine new compreliensive virtualization management 
tools designed to combat problems and risks 
associated with virtualization 

(877) 945-6325 


stantly Search 
Terabytes of Text 

instantly Seareh 
Terabytes <rfText_ 

♦ dozens of indexed, unindexed, 
fielded data and full-text 
search options (including 
Unicode support for hundreds 
of international languages) 

♦ file parsers / converters for 
hit-highlighted display of all 
popular file types 

♦ Spider supports static and 
dynamic web data; highlights 
hits while displaying links, 
formatting and images intact 

♦ API supports .NET, C++, Java, 
databases, etc. New.NET 
Spider API 

^^The Smart Choic^tor 
Text Retrieval® since 1991 

♦ "Bottom line: dtSearch manages a terabyte of text in a single 
index and returns results in less than a second" - InfoWorld 

♦ "For combing through large amounts of data," dtSearch "leads the 
market" - Network Computing 

♦ dtSearch "covers all data sources ... powerful Web-based engines" 
- eWEEK 

♦ dtSearch "searches at blazing speeds" - Computer Reseller News 
Test Center 

See for hundreds more reviews, 
and hundreds of developer case studies 

ct dtSearch for fully-functional evaluations 

1-800-IT-FINDS • 301-263-0731 • 


September 26, 2008 

Page 7 

Networking & VPN 

September 12, 2008 

Manage Critical 
IT Issues From 
One Console 

Dorado Software's Redcell Network 
Commander Automates Manual Configuration Tasks 

Many of the important operations facing 
IT administrators today can all be 
addressed via Redcell Network Comman- 
der's consolidated user interface. 

Redcell Network Commander's configu- 
ration management capabilities enable 
administrators to automatically configure 
and maintain their IT environments. They 

Redcell Network Commander eliminates 
inefficiencies and errors caused by manual 

can automate backup and restora- 
tion, easily perform device config- 
uration comparisons, and update 
OS and firmware to hundreds of 
devices at once, eliminating the 
inefficiency and errors associated 
with manual configuration. With 
the easy-to-use graphical user interface, 
administrators can perform all device con- 
figuration tasks and track all changes. 

Redcell Network Commander also has 
change and compliance management fea- 
tures, including both event and policy- 
based detection, proactive configuration 

scanning, and comprehensive compliance 

Redcell Network Commander is part of 
the Redcell for Enterprise Suite, which 
includes Redcell OpsCenter, a discovery, 
inventory, and monitoring platform. 

Redcell Network Commander 

Free trial available at 

Automated change and configuration management 
application built for sophisticated network environments 

(916) 673-1100 



Messaging & Telephony 

September 5, 2008 

Add Skype, Keep Your 
Phone Infrastructure 

VoSKY Exchange Pro Doesn't Need Skype Software, 
Computers, Or Headsets 

With Skype's cost savings, it only makes 
sense to integrate Skype into your compa- 
ny's IP-PBX. The VoSKY Exchange Pro 
VISIP-EX is a gateway that features SIP 
trunk ports to let you assimilate Skype into 
your enterprise environment. Other than 
fiscal savings through using Skype, users 


also get to take advantage of all of Skype's 
business features and services, such as 
interactive voice response, automatic call 
distribution, and call recording. 

The Exchange Pro VISIP-EX gateway 
adds up to 30 lines of Skype, and because 
employees can make and receive phone 
calls over the existing corporate PBX, IT 
staff won't need to maintain Skype soft- 
ware or specialized headsets. Telecom- 
muters and traveling workers can also 
use the free Skype client on a laptop 
or smartphone to avoid the complexities 
associated with remotely accessing 

The VoSKY Exchange Pro VISIP-EX 
also lets companies add Skype business 
applications to the IP PBX. For instance, 
you could set up a Skype-powered click- 
to-call button on the Web site to improve 
online sales and offer a more comprehen- 
sive sales presence. The gateway also 

transmits all inbound and outbound Skype 
calls in the company's Call Detail 
Records archive. Based on VoSKY' s 
Linux platform, the Exchange Pro VISIP- 
EX offers enterprise-grade performance 
and scalability. 

VoSKY Exchange Pro VISIP-EX 

$7,500 for 18 ports or $12,000 for 30 ports 

With the VoSKY gateway, users can make and receive 
Skype calls from their regular office phones 

(408) 731-3900 


Visit our Website at to learn 
more about our products 

An original 
equipment manufacturer ^ 
since its inception in 1992, 
Hergo remains THE trusted 
source for technical 

ergo 888.222.7270 

GSA Contract # - GS-29F-01 33G 

56-01 55th Avenue, Maspeth, New York 11378 

Page 8 

September 26, 2008 


August 29, 2008 

August 22, 2008 

Data Center Design 
Goes Virtual 

Future Facilities' 6SigmaDC Data Center Design & Analysis 
Suite Offers Virtual Facility Planning 

6SigmaDC's 3D modeling helps data center designers test out ideas, 

A GOOD DATA CENTER Starts with good 
design; it must be planned and laid out in 
such a way that heating, cabling, and 
more are done from a power, space, and 
cooling standpoint. Future Facilities' 
6SigmaDC Design and Analysis soft- 
ware suite offers tools that let you create 
a 3D virtual facility to test out ideas. 

Designers can create a VF (virtual facil- 
ity) that essentially gives users a full 
inventory of the room, including cabinets, 
IT equipment, power systems, cooling 
systems, and ventilation grilles. Users can 
use the VF to help configure cabinets with 
rack-mounted equipment, to configure the 
facility or room, to act as a layout and 

testing tool for room equip- 
ment, and to show ongoing con- 
figuration and facility manage- 
ment so changes can be tested 
before implementation. 

Features include an easy-to- 
use GUI; the ability to read 
data from other design tools; 
large libraries of IT and sup- 
porting equipment such as 
ACUs, PDUs, and cabinets; 
and a complete view of the 
inventory. The suite also offers 
drag-and-drop capabilities to 

aid in model construction and 

can predict grille flows, equipment 
resilience, ACU performance, cooling 
features, and energy efficiency metrics. 

Future Facilities 6SigmaDC 
Design & Analysis v4 

Data center design tool that lets users create a 
virtual facility to test out configurations 

(408) 436-7701 

ftif ure fmilities 

Remote Backup 
& Data Loss Prevention 

Spearstone's DiskAgent Offers Enterprise-Class Backup 

J J Chi* 

«(' ssa iKiw 10.1)3 

□ '^-iiitM. cinvni, m atHKt! viia>t i.^msii 

^ nrinuh m mrnn i!i.«7 

i \'. _i 5p«iaa-. 

fnaiwmimlatd t13f tlS US 
Ei4n<(i4tMlh<liv tm 1U« Hit 

DiskAgent by Spearstone lets you create secure online backups. 

Data is perhaps the most valuable com- 
modity a company possesses, and being 
able to recover it in the event of a disaster, 
secure it from a malicious hacker attack, 
or retrieve and protect it if a computer is 
lost or stolen is of utmost importance. 
DiskAgent SaaS (software as a service) 
from Spearstone seeks to offer a solution 
with remote backup and loss protection. 

DiskAgent offers data storage and pro- 
tection with an easy-to-use, scalable SaaS 
offering. Features include continuous 
online backup with centralized manage- 
ment and constant access to data, and if 
hardware is lost or stolen, users can 
remotely erase data, effectively prevent- 
ing thieves from accessing sensitive 
files. DiskAgent lets IT admins track 
and potentially recover any stolen 

devices with its hardware re- 
covery functionality. 

By encrypting all backed 
up data as it moves both to 
and from the Amazon S3 and 
EC2 environments, DiskAgent 
meets security regulations and 
lets admins enforce document 
retention policies and grant or 
restrict user access to remotely 
backed up files. 

The DiskAgent SaaS is an 
easy-to-use package offering 
remote backup options and data loss pro- 
tection. Yet DiskAgent is designed as an 
enterprise-level protection package that 
individuals other than IT professionals 
can implement and maintain and requires 
no expensive infrastructure. 

DiskAgent by Spearstone 

Starts at $4.95 per month per device; volume 
discounts available 

SaaS (software as a service) that provides continuous 
online backup and remote device wipe capabilities 

(877) DSK-AGNT 
(877) 375-2468 



80 PLUS 


4.0 READY 

ES ATX 12V(v.2.2)8cin Fan Series 

Seasonic ES series connes with 300, 350, 400, and 500 Watts, featuring Active 
PFC, Snnart and Silent Fan Control, 80% + efficiency and so nnuch nnore. All of 
these contribute Seasonic ES PSUs to received certification of 80 PLUS® and 
Energy Star 4.0 ready. In addition, all of Seasonic PSU has nnet the RoHS re- 
quirement. To believe in energetic thinking, think Seasonic. To find out 
nnore,visit http://www.seasonicusa.conn. 

30py^ 350W 
I Factor Series 


Industrial 1 U/2U Series 

USA Office 

TEL: +1 626-969-9966 
FAX: +1 626-969-9986 


TEL: +1 626-820-8988 

FAX: +1 626-820-8188 


TEL: +1 510-226-8000 
FAX: +1 510-226-8858 


TEL: +1 800-949-4567 
FAX: +1 604-276-0807 


SINCE 1975 

September 26, 2008 

Here Comes 
The iPhone 

How To Make Apple's iPhone 
Work In Your Enterprise 

by Christian Perry 

• • • 

Had Paul Revere been an IT manager 
in today's enterprise world, perhaps he'd 
be known for yelling, "The iPhones are 
coming! The iPhones are coming!" After 
all, Apple's innovative smartphone is 
invading enterprises with impressive 
swiftness, and employees are using the 
device to compute and communicate — 
regardless of whether company policy 
allows use of the device. 

"While the iPhone isn't perfect for every 
business, it is definitely accelerating the 
adoption of PDAs/smartphones that indi- 
vidual employees are purchasing — even if 
corporations and employers are not," says 
James Bond, director of engineering for 
Apptix ( "The days of 
the IT department enforcing only a single 
PDA/smartphone standard have been 
replaced with trying to keep up with the 
demands of users." 

Security First 

In a perfect world, IT managers would be 
aware of every device used by employees 
in their organization. But reality paints a 
strikingly different picture, and the iPhone 
is the perfect example of that reality, 
because employees are often using the 
device regardless of company policies. 
Rene Poot, international systems engineer 
for NCP Engineering ( 

iPhone Update 101 

As with other mobile devices, the success of 
the iPhone relies heavily on IT's and the users' 
abilities to keep it updated with the latest firm- 
ware. According to James Bond, director of 
engineering at Apptix (, this 
process can be performed by users simply by 
connecting the iPhone to a USB cradle or ca- 
ble and allowing ilunes to perform the update, 
although he says he hopes to see Apple or a 
third party soon provide the ability to centrally 
track updates or even force or push updates 
over the air. 

Because updates are critical to the i Phone's se- 
curity and general function, enterprises must 
ensure that users are indeed updating. Dustin 
Shafae', operations manager for 

says that if corporate 
policy dictates that 
employees can use 
their own devices, IT 
should be aware of 
the security implica- 
tions and educate 
users on the poten- ^ 
tial dangers. 

"The users need to 
understand the im- 
plications of what 
damage can be done 
and the responsibili- 
ty required when ac- 
ces sing/storing 
information on their 
phones just as they 
do with company- 
issued notebooks. I 
believe an educated 
user is very valuable. 
Locking down or 

limiting the user will often encourage cre- 
ative people to find the means to circum- 
vent the security solution that' s imposed on 
them," Poot says. 

IT managers need to understand what the 
iPhones will be used for, where they will be 
used, and how they will be used, Poot says, 
in addition to the device's limitations and 
manageability issues. A major concern with 
the iPhone is its lack of entire-device 

( says that the process 
isn't always smooth. He explains, "The updates 
do require a lot of time. We have updated our 
phones three times since we've gotten them. 
Halfway through the update process, your PC will 
prompt you to plug in your iPhone, even when it is 
already connected. After unplugging and recon- 
necting, the iPhone provides the message that 
the update had been interrupted and that the soft- 
ware needs to be reset." 

Says Bond: "Just as with other PDA and smart- 
phone devices, the asset management of cor- 
porate-owned—and even employee-owned— 
devices is a challenge. I am sure we will see 
more tools available in the future to assist with 
this that may or may not be iPhone-specific." 

encryption, which can become a problem 
when users store sensitive company infor- 
mation in the device. 

"What happens to a device when it's lost, 
displaced, or stolen? If it's not returned, 
what happens to the data that's stored on 
the device? What about tools on the device 
that allow for remote access to the corpo- 
rate network via Telnet, VPN, email, or 
VNC or RDP [Remote Desktop Protocol] 
tools that are now also available for this 



1 1 


platform? This is just as applicable for any 
mobile device, and so the IT security man- 
ager can apply the same security policies," 
Poot says. 

Thomas Ingham, co-founder and chief 
technologist at Coalmarch Productions 
(, says a mistake peo- 
ple are making is that they're considering 
the iPhone as something other than a regu- 
lar computer. "We take all the same pre- 
cautions in securing our network with any 
device that's going to be playing in our 
sandbox on a daily basis. This means 
strong security on your wireless network 
that's probably already in place, supported 
by a healthy respect for limiting the public 
visibility of your critical business data," 
Ingham says. 

Welcome To The Fold 

Whether enterprises deploy iPhones as 
enterprise-wide devices or allow employ- 
ees to use iPhones at their discretion, the 
iPhone has tools that help to simplify in- 
tegration with the enterprise network. 
Bond recommends using the iPhone Con- 
figuration Utility to preconfigure settings 
for VPN, Wi-Fi, and Exchange accounts 
and then distribute the configure profiles 
to end users. 

"I also recommend configuring your 
Exchange environment for auto-discovery. 

Page 9 

whereby users can connect to your server 
by simply entering their email address and 
password into the iPhone, [and] Active- 
Sync will automatically discover the server 
name, SSL settings, etc.," Bond says. For 
enterprises deploying iPhones, he says that 
to minimize support calls to IT, "I would 
openly announce which features are and are 
not enabled on the iPhone and its built-in 
ActiveSync. For example. Notes and Tasks 
are not synchronized to the iPhone over 

Bond also recom- 
mends instructing users 
what to do and what 
not to do when it comes 
to configuring their 
iPhones via iTunes. For 
example, he says it's 
easy to accidentally 
"kill" calendar and con- 
tact data on the iPhone 
when trying to use Ap- 
ple's MobileMe server 
along with Exchange/ 

Dustin Shafae', oper- 
ations manager at Pa- (www 
recommends tasking a 
person or team with 
configuring the email 
feature on iPhones for 
end users. "Although it 
was relatively easy for 
our younger users in 
the Papercheck main 
offices, an older user who is not familiar 
with technology will have more difficulty 
and take more time to complete the email 
configuration. [Leaving the task to IT] will 
save you time, frustration, and money, 
since the employee activating his or her 
phone would be doing so while on the 
clock," Shafae' says. 

Other Concerns 

Regardless of the number of iPhones in 
an organization, iPhone management can 
be tricky due to the lack of a mature central 
management system, Poot says, although 
the Configuration Utility is a step in the 
right direction. He adds that exploit vulner- 
abilities in versions of Safari running on 
iPhones can allow the theft of call records 
or contacts by people who trick the phone's 
user into opening a maliciously constructed 
link. Further, he says, security patches from 
Apple are slow. 

Finally, for enterprises using Exchange, 
Bond recommends enabling ActiveSync 
on their Exchange systems for email, cal- 
endar, and contact synchronization. If an 
organization doesn't have Exchange 
servers in-house but wants to provide 
iPhone users with access to Exchange 
email and collaboration services. Bond 
suggests they look into hosted Exchange 


August 29, 2008 

Flexible, Reliable Servers 

Chieftec Smart & Bravo Work As Departmental Server, Workstation 

Every Chieftec product is designed 
with quality construction, flexibility, atten- 
tion to detail, and reliability in mind. These 
characteristics make our Smart and Bravo 
Series server solutions strong candidates 
for departmental servers and workstations. 

Made from 1mm SECC steel, the Smart 
and Bravo Series employ clean and round- 
ed-edge manufacturing techniques. Front 
and side panel locks are standard. Models 
support micro- to extended- ATX mother- 

boards, and a metal PCI card retention bar 
simplifies adding or removing cards without 
screws. Two USB 2.0 ports, one 1394 Fire 

Wire port, and line in/out audio connectors 
are on the front. Standard PSII or mini- 
redundant power supplies are supported. 
WH-OlAVH-02 Smart Series 

• Up to nine front accessible 5.25-inch 
drive bays include 3. 5 -inch drive carri- 
ers; eight on the WH-01 

• Cooling is performed by optional 
120mm rear or optional top fan mounts 

BA/BX/BH-01 Bravo Series 

• SmartScrew and tool-free drive mounts 

• The BA full tower has up to eight front 
drive bays and eight 3. 5 -inch internal 
bays; the BX and BH mid/mini-towers 
support up to six front-accessible bays 
and six internal drives 

• Flexible cooling options 

• Power the system with Chieftec' s A135 
Series power supply 

• Cable management options assure cool, 
stable, reliable, and efficient system 

• Backplanes in a variety of SAT A, SAS, 
or SCSI RAID/JBOD configurations 

Bravo Series BA/BX/BH-01 B-B-B 
Smart Series WH-01/02B-B-B 

Server solutions that feature clean and rounded edges 
in a variety of options and configurations 

(510) 324-3888 


September 26, 2008 

Preference Survey 

Crafting an employee survey can be a boon 
for IT when determining which mobile device 
is right for a specific employee. Here are the 
types of questions that can help narrow the 

• What software applications do you use 
every day? 

• How often do you access email and calen- 
dar programs from your laptop or phone? 

• Do you prefer several devices— PDA, 
laptop, and cell phone— or to have all 
functionality within one device, such as 
a BlackBerry or iPhone? 

• What devices, such as laptops and smart- 
phones, have you used in the past, and 
what did you like and not like about them? 

• When you travel for work, would you pre- 
fer a ruggedized device that can withstand 
harsh environmental conditions or is that 
not important for the type of sites you visit? 

Page 10 

Device Is Right? 

Continued from Page 1 
can play on a number of devices, including 
the iPhone. 

Mobile apps around customer relation- 
ship management are growing fast, and 
companies are integrating these more often 
than in the past, notes Michele Pelino, 
senior analyst at Forrester Research. 

"You're starting to see companies tie 
these mobile applications in the needs of a 
particular function in a business," she says. 
"So, there are particular apps that are in 
vertical markets and might appeal to com- 
panies that hadn't considered using mobile 
devices before." 

Travel Frequency & Personal Preference 

Travel to work sites — such as salespeo- 
ple who go to construction areas or rural 
locations — may steer device selection 
toward something that' s ruggedized. 

Although there are a number of cases for 
PDAs, smartphones, and laptops that 
promise protection from drops and spills, 
it' s usually preferable to select a device that 

was built with rugged use in mind because 
special manufacturing techniques are used 
to reduce shock to interior components 
such as hard drives. 

Another factor to consider is the employ- 
ees' personal preferences. But sometimes, 
asking employees what they want to carry 
can be a challenge. Early adopters might 
want the newest, most cutting-edge device, 
while those who are skittish about technol- 
ogy could request a simple cell phone up- 
grade. But getting employees' thoughts about 
what they prefer is important because there 
needs to be a level of comfort with a device 
for it to be used properly. 

For example, an executive who hates the 
iPhone' s interface and touchscreen will be 
less likely to use the device and might 
"cheat" on the assigned device by introduc- 
ing one that's more familiar, such as a 
BlackBerry. This would introduce prob- 
lems into the IT mix because of necessary 
upgrades, security issues, and repairs. 

Also, some users may prefer laptops over 
smartphones or PDAs because they're able 

I Getting employees' thoughts about what 
they prefer is Important because there needs 
to be a level of comfort with a device for It to 

I be used properly. 

to store more data and have greater func- 
tionality. Creating a comprehensive em- 
ployee survey not only allows IT managers 
to track preference trends but also gives 
insight on technology comfort levels. (See 
the "Employee Preference Survey" sidebar 
for more information.) 

Interoperability, Cost & Security Controls 

Some employees may appreciate using 
just one device, such as a laptop, while oth- 
ers prefer using several devices, such as an 
iPhone, an additional cell phone, and a 

When choosing what can fill up employ- 
ees' bags, IT should look closely at how 
these devices will be able to play together, 
believes Richard Rushing, CSO of Air- 
Defense ( And often, 
that means more than just whether software 
can sync. 

"Most devices have some levels of inter- 
operability, but issues with coverage and 
billing could come up more often than 
issues about whether the devices can com- 
municate," he says. 

Cost is linked to interoperability because 
supporting several types of devices can be 
more costly than negotiating a single sup- 
port contract. 

No matter what type of software or de- 
vice is chosen, security should be an impor- 
tant consideration when locking down both 
the device itself and the data that's con- 
tained within it, adds Rushing. 

"One thing to keep in mind is how easy it 
would be for the device to be lost or 
stolen," he says. "This could have a great 
impact on security concerns and risks. 
Simple things like boot-up passwords and 
PIN and encryption can play a role, and 

Leasing Equipment 

Continued from Page 1 
For example, he says, most enterprises 
can earn a higher return on investment 
within their business than a lease's or bank 
loan's interest cost. Thus, many times it 
makes sense for an enterprise to generate 
more revenue by investing its cash rather 
than spending it on equipment. 

Avoiding Potential Pitfalls 

BottomLine Advantage's Cantliffe says 
a potential "gotcha" with leasing compa- 
nies is a contract provision that lets a leas- 
ing company change a lease payment if 
equipment costs change. This provision, 
he adds, is usually unnecessary and poten- 
tially costly because equipment costs do 
not change that frequently. Enterprises 
should avoid signing leases that contain 
this provision. 

Leasing Checklist 

Ed Lucente, manager of financial services at 
Verari Systems (, recommends 
considering the following checklist to help you 
avoid pitfalls as you seek a leasing solution. 

• Does the contract provide details about the 
type of lease; the lease's expiration date; the 
accepted payment procedures; deadlines for 
cancellation, renewal, and contract change 
notices; and the timeframe of the lease? 

• Is the price of contract modification included 
for early termination, return to lessor, exten- 
sion of lease, purchase option at end of 
lease, and/or upgrades? 

• Is there a provision allowing each piece of 
the lease to be treated as a separate item? 

• Is there a provision allowing substitution of 
like items for lost or damaged equipment at 
end of lease? 

• Is there a complete description of the proper- 
ty to be leased? 

• Are delivery times and dates specified? 

• Are warranty period and conditions defined? 

Another pitfall is what Tom Williams, 
president and CEO of, calls 
"The End-of-Term Surprise." According 
to Williams, leasing companies typically 
offer four ways to close out a lease: pur- 
chase of the equipment for a fixed amount, 
purchase of the equipment at fair market 
value, return of the equipment, or contin- 
ued leasing of the equipment for a time 

Williams warns that many enterprises 
sign leases without fully understanding 
these closing options, guaranteeing them- 
selves an unwanted surprise at the end of 
the lease. SMEs should understand what 
they will own and what they will owe at the 
end of a lease before signing a contract. 

Williams also recommends that enter- 
prises be aware of potential state sales or 
use taxes or even personal property tax 

• Is acceptance criteria defined? 

• Are insurance and business continuity re- 
quirements defined? 

• Has the provision of leaner equipment in 
case of damage/repair been addressed? 

• Is estimated residual value specified? 

• Are end-of-lease notification requirements 
clearly defined? 

• Are packaging and shipping terms defined? 

• Are maintenance and upgrade minimum 
standards to be met by the company/division 

• Are roles and responsibilities for support 
agreements outlined for maintenance, down- 
time, vendor management assistance, instal- 
lation, and/or training? 

• Are lessee rights clearly outlined? 

• Is it clear how the company/division will en- 
force the contract? 

• Have the legal and financial departments 
reviewed the contract? 

• Has all legislation regarding the acquisition of 
IT been met? 

issues triggered by leases. Also, he adds, 
businesses should choose their vendors and 
equipment carefully. Because a leasing 
contract is a three-way contract between a 
business, the leasing company, and an 
equipment vendor, the business is responsi- 
ble for paying the lease regardless of the 
effectiveness of the equipment. 

Verari 's Lucente recommends that enter- 
prises choose IT equipment lessors that 

have financial strength; worldwide scope; 
and contract, asset management, and 
administrative flexibility. Leasing compa- 
nies should also have flexible programs 
(such as capacity-on-demand or short-term 
leasing), IT portfolio expertise with a deep 
understanding of IT life cycles and multiple 
asset classes for project management, and 
asset recovery services. 

Insurance Blues 

Another potential pitfall is the addition by 
leasing companies of insurance coverage for 
equipment if business insurance will not 
cover the equipment, says' s 
Williams. Also, he adds, some leasing com- 
panies will charge a fee for not having 
insurance instead of adding the insurance 
themselves. At the end of the day, says 
Williams, enterprises should not assume 
that insurance is provided by the leasing 
company and should ask about it before 
signing a contract. 

Even SMEs that already have suitable 
insurance coverage can run into a snag with 
this. Cantliffe says an additional profit cen- 
ter for leasing companies is add-on insur- 
ance when the lessee has not provided 
proof of insurance to the lessor. 

"It is a real hassle to clear this up, so 
make sure you get acknowledgement from 

each of these dictate the type and amount 
of security needed for mobile devices." 

Some companies have taken the tactic of 
allowing only preapproved devices in the 
workplace and banning others that can 
access the network. Although this might 
work in theory. Rushing thinks it's unreal- 
istic in practice. 

"If you tell an employee he can't bring 
and use his cell phone, he will likely just 
keep it hidden," he says. "Allowing devices 
to operate in your enterprise without any 
rules or policies is truly the biggest risk." 

the lessor of their receipt of your proof of 
insurance," warns Cantliffe. 

In fact, Cantliffe recommends that enter- 
prises ask the equipment vendor to agree (in 
writing, on the equipment order form) to 
monitor the leasing company's acknowl- 
edgement of a property insurance certificate. 
He adds that enterprises can add language to 
an equipment order form stating that if there 
is a property insurance cost added to a lease 

invoice after a property insurance certificate 
has been supplied to the vendor, the vendor 
will remove it from the lease invoice. In 
short, he says, make the vendor responsible 
for handling this potentially thorny issue. 

When Not To Lease 

Even though leasing can offer an enter- 
prise considerable advantages, there are 
times when leasing doesn't make sense. 

Verari' s Lucente says in cases where the 
projected productive or useful industry life 
of the IT asset is longer than five years, it 
makes more sense to purchase. Although, 
he adds, a well-positioned lessor may be 
able to offer an operating lease that is an 
attractive alternative to purchasing the 
equipment outright. 

Also, there are times when purchasing is 
perceived as being simpler than leasing. 
This may occur in cases where a capital 
budget exists for the acquisition, and a pur- 
chase may appear to be the simpler transac- 
tion. But, he adds, an IT lessor may be able 
to demonstrate compelling advantages to 
leasing, even under these circumstances. 

Finally, says Lucente, there are those 
times when a business has been burned by 
a previous leasing experience that ended 
badly. The best cure for this, he adds, is 
selecting a trusted, world-class lessor. 

Enterprises should choose IT equipment 
lessors that have financial strength; worldwide 
scope; and contract, asset management, and . 
administrative flexibility. I 

September 26, 2008 

Mobile Woes 

Solving Five Common 
Mobile Phone Issues 

by Chris A. MacKinnon 
• • • 

Data center help desks are getting an 
increasing number of mobility-based calls 
from enterprise users carrying smartphones 
and cell phones while away from the office. 
Why? Because the phones keep getting 
smarter — so smart, in fact, that companies 
are loading their employees with phones 
that can help them do their jobs just about 
anywhere. But better mobility does not 
come without a troubleshooting price tag. 
Here we look at the five most common 
problems (and their respective solutions) 
business users will encounter while using 
their cell phones. 

Catching Missed Calls 

According to Mark Amszej, director of 
channel product management at RIM 
(Research In Motion;, one 
administrative challenge for mobile work- 
ers is keeping up with the backlog of 
voicemail messages left while they were 
out of the office. He says enterprises can 
virtually eliminate this hassle while 
improving the responsiveness of the work- 
force by turning smartphones into mobile 
extensions of desk phones. "This capabili- 
ty requires back-end technology that 
mobilizes the corporate phone system," 
Amszej notes. "With this capability, 
mobile workers have one 'reach me any- 
where' phone number that simultaneously 
rings on both their desk phone and their 
smartphone — no more missed calls and no 
more voicemail backlogs." 

Amszej says calls answered on a smart- 
phone can be handled with standard func- 
tionality available on desk phones, includ- 
ing the ability to put a call on hold, transfer 
to another extension, or connect to a con- 
ference call. 

Protecting Smartphone Content 

In Amszej 's opinion, one of the primary 
concerns of organizations with smartphone 

Most Common Problem 

Mark Amszej, director of channel product man- 
agement at RIM (Research In Motion; www.rim 
.com), says one of the most common issues 
enterprise users run into with their cell phones 
is battery problems. 

One solution, according to Amszej, is using 
replaceable batteries. "Workers who are away 

deployments is protection of corporate 
information. He says the first line of 
defense for IT departments is to set a pass- 
word policy and a timeout period. "For 
example, administrators can set policies for 
four-character passwords or 15-character 
passwords that have alpha, numeric, and 
special characters." He elaborates, "It all 
depends on what they feel is appropriate 
for their organization. 
Next is a policy for lock- 
ing the handset after 
a period of inactivity. 
This could be [for] one 
minute to eight hours, 
depending on what poli- 
cy is set. Setting these 
two policies at least locks 
the front door by protect- 
ing a smartphone from 
unauthorized access. If 
someone keys the pass- 
word incorrectly too 
many times, all of the 
data on the handset will 
be erased." 

Amszej also says that if 
information is extremely 
sensitive, an organization 
can turn on content pro- 
tection so that the data 
is stored in encrypted 
form. "Again, this is a 
policy that administrators 
can set." 

Mort Rosenthal, found- 
er and CEO of Enterprise 
Mobile (www. enterprise, says mobile 
device rules and regula- 
tions must be controlled 
with IT-managed tools, "per the company's 
security policy." He notes, "Depending on 
the applications, industry, and compliance 
requirements, enterprises need various lev- 
els of security, encryption, authentication, 
and audit ability. Certain functions should 
be allowed on the devices, and others must 
be removed. Any device that is expected to 
be sold to an enterprise needs to be ready 
for this kind of IT management. Device 

from the office or traveling for extended periods 
of time may want to consider carrying a spare 
battery for their smartphone," Amszej explains. 
"In the event that their battery runs low and they 
do not have access to a power supply to 
recharge it, or they have no time to recharge it 
while on the go, they can simply replace it to 
stay connected." 

management is a requirement when it 
comes to mobility." 

Managing A Lost Smartphone 

Because smartphones are very personal 
in nature, they can go everywhere the 
mobile worker goes. This means that there 
is the possibility that a smartphone can be 
lost, stolen, or left behind. Amszej says it is 

important for smartphone users to know 
who to contact within their organization in 
the event of a lost or stolen smartphone to 
ensure that the necessary steps are taken to 
prevent access to smartphone content by 
unauthorized persons. 

He explains, "Depending on the smart- 
phone server software, IT administrators 
have a number of remote capabilities to han- 
dle these situations. For example, they may 
have the ability to remotely lock a device in 
the event that it is not password-protected. If 
needed, they can go a step further and send a 
command to remotely wipe the data from 
the smartphone. In both cases, the handset 
reports back to the server that the command 
has been processed so administrators can 
confirm that the action has been taken." 

In addition, Amszej says IT may also 
have the ability to post a message on the 
smartphone' s screen with instructions for 
returning the lost smartphone to its owner 
(such as, "If found, please contact . . ."). 

Page 11 

Smartphone Usage In & Out 
Of Network Coverage 

While access to wireless networks has 
improved significantly in recent years, 
enterprise travelers continue to find them- 
selves roaming in and out of network cov- 
erage throughout the workday as they go 
into large office buildings, elevators, and 
underground parking garages and during air 
travel. Amszej says in these instances, it 
helps to have a smartphone that can be used 
out of network coverage to stay produc- 
tive — to read and queue up responses to 
email, find an address, or review docu- 
ments or presentations 
that they have stored 
on their smartphones, 
for example. He adds, 
"Smartphones enabled 
[with] push technology 
ensure that queued-up 
email and other content is 
exchanged immediately 
once back in range of a 
wireless network." 

Different Life Cycle 
For Enterprise Devices 

Rosenthal says choos- 
ing a mobility platform 
for the enterprise can 
be challenging. One of 

fthe biggest reasons for 
this, he explains, is that 
deployments typically 
take longer, and the 
shelf life for devices 
needs to last longer than 
that of consumer mobile 
devices. "Yet enterprises 
are expected to make 
platform and device se- 
lections just as a con- 
sumer would, with as 
much visibility as a con- 
sumer," Rosenthal says. "The enterprise 
planning horizon is certainly longer, and 
as a result, enterprises need to be privy to 
the longer-term view and product road- 
map. If you are planning a major deploy- 
ment in 90 days, you need to be able to 
select a device from everything that will 
be available in 90 days." 

To resolve these issues, Rosenthal rec- 
ommends managing the back end of a 
product's life cycle, which, he says, will 
ultimately match the life cycle to business 
requirements. He notes, "If an enterprise 
is in the middle of a deployment, there 
is an expectation that the standard device 
for that deployment will continue to be 
available throughout the deployment and 
for replacements. Yet in the consumer- 
driven mobile market today, devices 
launch and disappear in an instant. A 
device emerges without warning (or an 
ability to plan for it), and it disappears 
just as quickly." 

Networking & VPN 

August 29, 2008 

Compliance Is Key 

Maintain Compliance Standards With 
Secure Elements' C5 Compliance Platform 

Industry standards exist for a reason, 
but that doesn't make achieving compli- 
ance with every regulation any easier. 

Secure Elements' C5 Compliance Plat- 
form is a tool designed to enable an enter- 
prise to audit and evaluate its level of com- 
pliance all in one place and with one prod- 
uct. Further, the C5 Compliance Platform 
helps companies implement the necessary 
changes if and when compliance gaps are 

present relating to internal, industry, or reg- 
ulatory policies for IT control and security. 

The latest update to the platform is the 
ability to audit and manage EPA Energy 
Star settings for Windows XP and Vista 
computers. Now, companies can more 

easily comply with the mandate for com- centralized management of element sensors, 

puters and monitors to "sleep" when not which are lightweight software agents. 

in use. Command Center offers unified views of a 

Other features of the C5 Compliance company's entire compliance posture, and 

Platform include configuration compliance the compliance content library is maintained 

scores, vulnerability scores, patch scores, by C5's Security Labs professionals. 

and authorized software compliance ^ _, ^ ,. 

^ , 11 Secure Elements C5 Compliance 

scores. Benerits or the platrorm include Platform 

smart automation, which results in fewer 

errors, repeatable processes, and pre- Starts at $25,000 

dictable results; unified views for quick cnokuo^^.^^^^^^^^^ on.^ ^^nonn 

, , , . r • 1 Enables companies to audit, evaluate, and manage 

summary and detailed views of monitored compliance issues 

assets; and overall improved compliance. 

The C5 Compliance Platform is com- (703) 709-5011 

posed of four parts: C5 Element Manager, 
C5 Element Sensors, C5 Command Center, 

and C5 Compliance Content. Element SBCUrB elements® 

Manager is an Intel-based lU server for ^ audit, evaluate. comply. 

Page 12 

Access Anxiety 

Solving Five Common 
Remote Access Issues 

by Kurt Marko 
• • • 


provides serve as the brains of today's 
enterprise, and networks are its nervous 
system. Networked applications and ser- 
vices are critical to business operations, but 
companies can no longer assume that the 
employees using those critical systems are 
within the friendly confines of a corporate 
intranet. The increasing mobility of today's 
workforce means users expect access from 
anywhere, anytime, from tele workers man- 
aging email on the weekends to mobile pro- 
fessionals running CRM applications from 
their hotel rooms or in airport lounges. As 
such, IT departments recognize the need for 
remote network access as a given, but 
while the necessary technology is mature 
and relatively inexpensive, it presents a 
heap of potential security, support, and 
integration issues. 

Usage Complexity 

Since the demise of dedicated dial-up 
lines, remote access has been provided over 
the public Internet using tunneling proto- 
cols such as IPSec and PPTP to create 
VPNs. Yet on the client side, traditional 
VPNs can be tricky to set up and configure, 
often requiring sophisticated knowledge of 
networking concepts, says Dirk Morris, 
CTO of Untangle ( 
Yet Sarit Beck, product marketing manager 
at Citrix (, finds that 
sometimes "users don't want to learn any- 
thing new; they don't want to adjust." 

VPN clients can sometimes be preconfig- 
ured via an installer script; however, net- 
working problems can still arise for myriad 
reasons. Morris notes that IP addresses may 
overlap between external public networks 

and a company's internal intranet, or the 
routing tables on a client PC may become 
corrupted. Alternatively, an external net- 
work (which may simply consist of a Wi-Fi 
firewall/router run by the biggest geek on 
the hotel staff) may not perform network 
address translation correctly. 

Although traditional tunneling VPNs 
offer maximal flexibility, the added com- 
plexity is often not worth the cost. In- 
creasingly, companies are ditching these in 
preference of a Web-based SSL VPN. 
According to Gartner ana- 
lyst John Girard, "SSL 
VPNs have superseded 
IPSec (the Internet securi- 
ty protocol) as the easiest 
choice for casual and ad- 
hoc employee VPN access 
requests and for business 
partners, external main- 
tenance providers, and 
retired associates. SSL 
VPNs are easy to set up as 
application portals and as 
viable replacements for 
IPSec remote access." 

Another option, tailored 
for users with an office- 
bound desktop machine 
needing occasional remote 
access, entails turning 
remote systems into thin 
clients running all applica- 
tions on an office PC, a 
functionality that is available through any 
number of remote desktop products. 

Network Integration 

Building a remote access solution means 
putting a server or appliance that supports 
the requisite VPN protocols inside the cor- 
porate network. Because this device sits 
behind a company's firewall, connectivity, 
routing, or security impediments can arise 
when configuring firewall, intrusion detec- 

tion, or protection rules to allow external 
traffic access to the internal VPN gateway, 
says Andrew Cheung, president and CEO 
of 01 Communique ( 

One solution targeted to SMEs is an inte- 
grated UTM (unified threat management)/ 
VPN device. These are usually dedicated 
hardware appliances; however, software 
products can unleash similar functionality 
from an industry- standard server. 

According to Morris, SSL VPNs also 
simplify infrastructure integration because 

September 26, 2008 

applications now offer Web front-ends as 
an alternative to their native clients, SSL 
shouldn't be an issue for most, says Morris. 

Mobile Connectivity 

Given the rich, data-intensive Web appli- 
cations used by today's office workers, 
remote access virtually requires some form 
of broadband connection. While this isn't 
much of an issue for home tele workers with 
wired connections, getting a good network 
link on the road can be a challenge. Wi-Fi 
still isn't completely all-encompassing, and 
even where it's freely available, security 
can be problematic. Without Wi-Fi, users 
may likely be forced to rely on analog dial- 
up, which unleashes a new set of prob- 
lems — everything from noisy phone lines 

Most Common Problem: Data Security 

The impact of remote access on information 
security is the biggest concern of IT man- 
agers. In the words of Andrew Cheung, presi- 
dent and CEO of remote desktop provider 01 
Communique (, "Security is 
issue No. 1, No. 2, and No. 3." Vulnerabilities 
exist both in data transit over public networks 
and with files resident on mobile devices. The 
problem of in-transit network security has long 
been solved via various encrypted VPN tech- 
nologies, yet VPNs still require strong forms of 
user authentication and do nothing to protect 
data on clients. 

Username and password authentication has a 
litany of known vulnerabilities and so is often 
augmented with either one-time passwords or 
hardware encryption keys (usually a smartcard 
or USB key). Data on clients can be protected 
using a number of disparate techniques. One 
option touted by Cheung is the thin-client and 
remote desktop model with users accessing 
all applications and data on a secure internal 
system. Another approach is to accept the in- 
evitability of users storing sensitive data on their 
laptops by fortifying these vulnerable systems 
via disk or file encryption. 

their traffic runs over standard HTTPS port 
443, which firewalls universally permit. 
The thin client/remote desktop approach 
can also simplify network integration 
because its connection path uses an exter- 
nal service provider, again via standard 
SSL, to broker communications between 
the remote client and internal host machine. 

Application Access 

The ultimate goal of remote access is, 
of course, access, whether to internal 
applications or data; however, Morris 
notes that remote users may be unable to 
get full, unfettered access to some appli- 
cations and services. For example, many 
SSL VPNs don't support non- Web-based 
protocols. Likewise, Morris says client 
applications that need direct access to an 
internal database probably won't work 
through an SSL VPN. 

For users requiring full, transparent 
access to internal networks, just as if they 
were in the office, the only solutions are 
either the traditional tunneling VPN, such 
as IPSec or PPTP, or a remote desktop dis- 
play. Those that can live with Web-based 
applications are better off with a sim- 
pler SSL VPN. Because most enterprise 

causing dropped or slow connections to 
modem configuration issues. 

One solution that can significantly 
increase the availability and security of 
wireless access is to contract with a Wi-Fi 
aggregation service. Additionally, mobile 
high-speed 3G data services from one of 
the major carriers offer greater geographic 
coverage, although they are relatively ex- 
pensive — often more than double the price 
of a wired broadband connection. 

User Setup & Support 

Mobile users work anywhere, anytime 
and thus are more likely to have IT support 
questions at odd hours. SMEs with limited 
support staff designed for weekday cover- 
age may be faced with frustrated users if 
they can't resolve problems after-hours or 
on weekends. The traditional solution — 
comprehensive user support outsourcing — 
may be overkill for just a few remote users; 
however, third-party remote control ser- 
vices can fill the gap with their high-avail- 
ability infrastructure and 24/7 support, 
according to Citrix' s Beck. Similarly, Wi- 
Fi aggregation services are generally 
staffed to handle customers' connectivity 
problems at all hours. 

Messaging & Telephony 

August 22, 2008 

Archived Email 
At Your Fingertips 

Comprehensive, Easy-To-Use 
& Affordable Message Archiving 

The Barracuda Message Archiver is an 
integrated hardware and software solution 
designed to archive email communications 
sent and received by enterprise users. It 
automatically stores and indexes all email 
messages in real-time while making them 
available for rapid searching and retrieval 

by authorized users. To immediately cap- 
ture new messages, Message Archiver 
takes advantage of the journaling feature 
of Microsoft Exchange and other stan- 
dards-based email servers. It can also 
import historical emails and PST files for 
a complete archive. 

Right out of the box, you can satisfy any 
legal requirement to retain your email with- 
out the integration hurdles of software-only 
solutions or security and network implica- 
tions when using hosted services. You can 
search the archives and create alerts for any 
email that may violate either standard or 
custom policies. Using a sophisticated 
roles-based user interface and tamper-resis- 
tant storage, you can enforce internal access 
control policies to help comply with corpo- 
rate policies and regulatory compliance. 

The Barracuda Message Archiver takes 
advantage of Barracuda Networks' exper- 
tise in threat protection by ensuring that 
historical emails are scanned for viruses, 
spyware, and other malware threats before 
they are retrieved. Energize Updates keep 

the system up to date with the most cur- 
rent policy definitions, updates to the lat- 
est document file formats needed to 
decode content within email attachments, 
and security updates against the latest vul- 
nerabilities and malware threats. 

Barracuda Message Archiver 

Starts at $4,999 with no per-user license fees 

Arcliive email communications sent and received by 
users throughout your organization 

(888) 268-4772 



September 26, 2008 

Page 13 


August 15, 2008 

Simplify Web Development 

Gizmox Visual WebGui For Silverlight 
Streamlines Enterprise Applications 

The development cycle of enterprise 
applications is critical for programmable 
Web plug-ins such as Microsoft Silverlight. 
A RAD (rapid application development) 
framework is one tool that can reduce over- 
all development cycles. Gizmox has devel- 
oped the Visual WebGui for this precise 
purpose, while still offering great flexibility. 

Visual WebGui is a graphical user inter- 
face that enables Microsoft Silverlight for 

rich data-centric Internet applications suited 
for enterprises. The framework introduces 
seamless integration to Visual Studio and 
offers the Web developer simplicity through 
its Windows Forms drag-and-drop interface 
design. Additionally, WebGui incorporates 
the ASP.NET deployment model and 
allows full Silverlight graphics capabilities. 

Executing complex AJAX applications 
can require a sharp learning curve; how- 

ever. Visual WebGui features server- side 
controls that function in the same manner 
as desktop application controls, effective- 
ly replacing AJAX browser controls in 
runtime. The WebGui complete control 
toolkit currently contains more than 50 
customizable out-of-the-box implemented 
for decoupled presentation in either 
DHTML or Silverlight layers. 

The user-friendly interface is easy to 
deploy for complex enterprise-level AJAX 
applications thanks to WinForms API and 
design-time support. Powerful object-ori- 
ented programming transports AJAX 
without consuming more than 1% of 
bandwidth. Visual WebGui application 
security is military-grade, as well, because 
it runs on the server, so the browser oper- 

ates as a viewing pane to the server, and 
no sensitive data is transferred. 

Gizmox Visual WebGui 

Standard Server + SDK for $1 ,500 per developer seat 
per year; Standard Silverlight extension + SDK for 
$500 per year; Standard Silverlight Extension + 
Standard Server + SDK for $190 per developer seat 

per year 

Open-source RAD platform for Microsoft Silverlight 
Web IT applications 


(^Visual WebGuu 

bringing AJAX & Silverliglit to enterprises 

Networking & VPN 

August 8, 2008 

Manage Media Networks 

Packet Island PacketSmart-Lite Platform ^ 
Troubleshoots Voice & Data Networks 

PacketSm&rt-Lite Server 

PacketSmart-Lite, an entry-level version 
of Packet Island's PacketSmart platform, is 
ideal for small and medium-sized business- 
es. PacketSmart-Lite includes everything 
needed to quickly and reliably troubleshoot 
voice/data networks for up to 10 differ- 
ent sites of 50 to 200 phones each. Each 
platform comes with a Linux-based Dell 
server fully loaded with Packet Island's pro- 
prietary PacketSmart software component 
and five compact micro appliances that 

provide sniffing 
and call genera- 
tion capability 
from each site 
remotely. Each 
can handle up to 
20 concurrent 
calls. SIP, 

MGCP, and Cisco proprietary signalin 
protocols are supported. 

The PacketSmart platform provides 
convenient 24x7 remote monitoring for 
each site, allowing deep visibility into 
network issues that cause 
voice, video, and data degra- 
dation. A browser-indepen- 
dent, Java-based GUI allows 
quick retrieval of critical data, 
such as jitter, MOS, dropped 
packets, router path, traffic 
spikes/transient effects, and 
even full packet capture. 
^^--^ Comprehensive reports are 
available to give you a reli- 
^'^'''^j able and automated snapshot 
of the state of your network. 
IT administrators can use the solution to 
perform the following functions: 

3nllffir * CaV QeHiftraicir 

• Assess data networks for VoIP readiness 

• Troubleshoot VoIP signaling issues 

• Verify LANAVAN QoS design based on 
TOS or Diffserv 

• Monitor live VoIP calls on a 24x7 basis 

• Remote packet capture with 
EtherealAVireshark compatibility 

• Monitor Top- 1 data flows 

• Generate a variety of on-demand reports 

Packet Island's PacketSmart-Lite 

Starts at $8,000 

Troubleshoots voice/data networks for up to 10 
different sites of 50 to 200 pliones eacli 


August 8, 2008 

A New Mindset 
For Security 

Parasoft Application Security Solution Improves Productivity 

security vulnerabilities and provides an 
automated system that applies state-of- 
the-art analyses throughout all stages of 
the SDLC, testing the application from 
the inside-out and outside-in to identify 
potential vulnerabilities. 

No matter what your motivation, 
Parasoft' s unique automated infrastruc- 
ture drives your development process to 
ensure that it remains on track and does 
not disrupt the team's workflow. 

Analysis capabilities include rule-based 
static analysis, peer code review process 
automation, data flow static analysis, pen- 
etration testing, runtime analysis/mon- 
itoring, and continuous regression testing. 

Process/workflow capabilities include 
security policy development, centralized 
policy management, automated infra- 
structure, centralized reporting, and error 
assignment and distribution. 

Parasoft Application 
Security Solution 

Continuous security process tliat identifies and 
remediates security vulnerabilities 

(888) 305-0041 


impeding your development productivi- 
ty. How? Establish a continuous security 
process with Parasoft Application Se- 
curity Solution. 

Parasoft solutions establish a continu- 
ous process that identifies and remedi- 
ates security vulnerabilities across every 
stage of the SDLC and ingrains security 
tasks into your team's workflow. 

The Parasoft system automatically 
monitors whether your security policies 
are implemented in the code, applied at all 
layers of the application stack, operate 
correctly in the context of realistic scenar- 
ios, and persist as the application evolves. 

It delivers a "jump start" solution for 
preventing the most likely application 


(408) 329-9608 


Page 14 

September 26, 2008 

Physical Infrastructure 

Sentry 30-A Fail-Safe Transfer Switch 

Provides fail-safe redundant power to single-power corded 

Fast Transfer Rate— Power interruption will not affect equip- 
ment uptime or performance 

Patented arc-suppression and power in-feed sharing tech- 
nology extend product life and performance 
High Density— 100 to 240V and 16/32A 

Server TechndosY/ Inc. 

Server Technology Inc. 

(800) 835-1515 
www . se r ve rtec h . CO m 

Physical Infrastructure 

NETWORK Series Network Rack 

Prices starting at 




ISO 9001:2000 Certified 

Need a COMM rack with the 
rack rails moved to one side 
to accommodate large cable 

You have the option to slide 
your vertical rack rails hori- 
zontally as well as vertically. 
Set your rackmount width to 
19 or 23 inches. Talk about 

Slide the rack rails to one 
side of the cabinet, allowing 
for additional 4 to 9 inches, of 
space on the opposite side to 
run large cable bundles. 

Rackmount Solutions Ltd. 

(866) 207-6631 

Physical Infrastructure 

CatSE And Cat 6 Cables 

We're more than a Rackmount Company! A complete line 
of CatSE, Cat 6 cables, including excellent bulk pricing. 

• CatSE patch and Cat 6 patch panels 

• Molded, snagless, strain-relief booted patch cables 

• Custom cable assemblies 

• CatSE and Cat 6 bulk UTP network cables 

• SVGA super monitor cables and VGA extenders 



ISO 9001:2000 Certified 

Rackmount Solutions Ltd. 

(866) 207-6631 

Physical Infrastructure 

Low Profile 19" Server Rack Cabinet 

Choose from a large selection of four different series to 
find a cabinet for your specific application. 

• Available in variety of sizes: From 3U-25U 

• Usable cabinet depth from 22.5"D to 34.5"D 

• Universal rack rails fit all major brand servers 

• use Series shown 

To Learn More, 


TM Information Support ConcGpts,iNc 

Leading Information Technofogy Products Since 1587 

Information Support Concepts Inc. 

(800) 458-6255 

Physical Infrastructure 

CS-27V Sentry Smart CDU 

Provides reliable power distri- 
bution. Use one IP address 
across different power circuits. 

• High Density 

• Multiple Voltage Outputs 

• Input Current Monitoring 

• IP Access & Security 

• Alerts for Power & 
Environmental Conditions 

• NEW! Fuse Retractors for 
Branch Circuit Protection 

• Environmental (Temperature 
& Humidity) Monitoring 

• NEW! Linking for Smart 
CDU (Expansion Modules) 

Server TechnoEosy, Inc. 

Server Technology Inc. 

(800) 835-1515 

Physical Infrastructure 

Air Conditioned Server Cabinet 

Prices starting at 




ISO 9001:2000 Certified 

• From 1 ,800 to 20,000 BTU 

• Rackmount and Sidemount 

• Three sets of L-shaped 
universal vertical rails 

• Base, casters, and leveling 
feet standard 

• Removable side panels 

• Lexan front door (or solid 
steel) w/ lockable handle 

• Steel rear door with lockable 
swing door handle 

• Avail, in heights of 24u, 30u, 
35u, 40u, 42u, 44u, 48u; 
depths of 24", 30", 36" and 
42"; widths of 19", 23"&24" 

Rackmount Solutions Ltd. 

(866) 207-6631 

Physical Infrastructure 

CS-3AVY Sentry Smart CDU 

/Provides reliable 3-Phase 
power distribution. Multiple out- 
let types distribute multiple volt- 
ages via 3-Phase 208V Wye 
power in-feed. 

Server TechnoEosKr inc. 

• High Density 

• Multiple Voltage Outputs 

• Input Current Monitor 

• IP Access & Security 

• SN MP Traps 

• Environmental (Temperature 
& Humidity) Monitoring 

• Branch Circuit Protection 

• NEW! Linking for Smart 
CDU (Expansion Modules) 

Server Technology Inc. 

(800) 835-1515 
www . se rve rtech . com 

Physical Infrastructure 

24 Receptacles 

LCD Display 
RS232 Access 

RPC 22 

24 Receptacle Remote Power Monitoring & Distribution 

Current, Voltage, Power, and Temp Monitoring 
LCD Screen Display 

RS232 Interface 120/208VAC 10,20,30A Models 
Power Distribution and Monitoring In One Unit 


(800) 523-2702 

Physical Infrastructure 

Classic Series - Portable Air Conditioning 

Ideal For: 

• Server Rooms 

• Electronic Equipment 

• Primary, Supplemental, or 
Emergency Cooling 


• Rentals and Sales 

• Installs in Minutes 

• Locations Nationwide 



IWs^inCDOi, Spotcooi SKI Ottks Piio are 

to Sales Memals. Inc. 


Atlas Sales & Rentals Inc. 

(800) 972-6600 

Physical Infrastructure 


Your environment, your cooling performance, 
your power. 

K3 Resource Manager 

AFCO Systems' unique combination of capabilities brings you 
the ability to plan, implement, or upgrade your data center 
facilities. Whether you require CFD modeling services, CAD 
modeling, or other data center planning services, AFCO 
systems is able to execute. Talk to AFCO and enable your 
ability to measure, manage, monitor, and maintain your critical 
data center facilities. 

AFCO Systems 

Datacenter Resource Solutions 

AFCO Systems 

(613) 249-9441 
www . at cosystem s . co m 

Physical Infrastructure 


Meets any price! 

CoolCube 10 

Tired of Overheated Server Rooms? The CoolCube 10 
Offers an Exceptional Cooling Solution for Electronics 

50% smaller than competitors, provides 10,000 btu/hr 
Installs into any 2- or 4-post 19" rack or is portable in room 
Automatic restart function for power outages 
Cost-effective for after-hours and weekend cooling 
Uses standard 1 15 VAC power source 



ISO 9001:2000 Certified 

Rackmount Solutions Ltd. 

(866) 207-6631 

Physical Infrastructure 

V Rack Wall Or Under Table Mount 

Not everything In 
life Is complicated. 


Simple-Cost Effective-In Stock 

• 19"w, 2u, 3u or 4u mounts 
to wall or under table 

• Utilizes small spaces 

• Supports 200 lbs 

• 14 gauge steel, cold roll steel 

• Black powder coat finish 

• Universal square mounting 
holes (screws to attach to 
wall are not included) 

Rackmount Solutions Ltd. 

(866) 207-6631 



ISO 9001 2000 Certified 

September 26, 2008 

Page 15 

Physical Infrastructure 



Dualcom S 

Cyber Breaker^ the Virtual Circuit Breaker™ 

IVIonitor and manage current consumption at EACH outlet 

TCP/IP or RS-232 

SNMP management 

Available with Enterprise Management Console™ (EMC) with 
Virtual PDU™ 



Cyber Switching Inc. 


Physical Infrastructure 

KoldLok Mini Raised Floor Grommet 

The KoldLok® Mini Raised Floor Grommet expands the 
product family to offer a smaller, 4- x 6-inch (100 x 150 mm), 
patent-pending thermal management sealing solution for 
airflow challenges. 

• Fire-rated and competitively priced 

• Saves energy and optimizes existing cooling equipment 

• Offered with or without static-dissipative feature 

designed and 
manufactured by 



Upsite Technologies 

(888) 982-7800 

Physical Infrastructure 

KVM Switch 

Modular KVM Switch 

1U DualRail sliding Drawer 

Plug & Play CAT5/ IP KVM 

OEM Design 

Cost- Effective Solution 

Design & Manufacturing Partner 

(714) 444-2390 

Physical Infrastructure 

Swltclied CDU CW-24V2 

Server Technologyf Inc. 

Power cycle individual or 
groups of outlets to remotely 
reboot network devices. 

• 208V to 240V Single or 3- 
Phase power at 20 or 30A 

• Access and Security: Web 
interface, SSL, SSH, Telnet, 
and RS-232 access 

• Environmental Monitoring 

• Fuse Retractor 

• High-Density 24 lEC CI 3 

Server Technology Inc. 

(800) 835-1515 
www . se rve 

Physical Infrastructure 

RS232 Access 
I Rebootable Receptacles 


8 Receptacle Power Control and Monitoring 

Current, Voltage, Power, and Temp Monitoring 
LCD Screen displays power monitoring information 
RS232 interface, 120/208VAC 10,20,30A Models 
Turn On, Off, or Reboot any or All Receptacles 


(800) 523-2702 



• Never lose data from a hard disk crash again 

• Easy to install and use on any server or PC 

• Keeps data mirrored on two drives at all times 

• No additional software or hardware is needed 

• Computer keeps operating even when one drive fails 

• Makes tape drives obsolete 

• $395 with free shipping 

Accordance Systems 

(866) 334-4446 

Physical Infrastructure 

1U 20.1" Rackmount LCD IVIonitor Drawer 

Separate Single rail design. Easy to install by one person. 
LCD Auto Shut off when it is in Closed Position 
LCD Panel protected by tempered glass 
Modular design scalable to 8/16 Combo KVM or 
8/16/32 cats KVM 

IP KVM and 2 Consoles via CATS Extenders options 


l-Tech Company 

(888) 483-2418 

Physical Infrastructure 

RS232 Port 

4 receptacles 
per side 


8 Receptacle Power Control / Monitoring w/Trans Switch 

• Current, Voltage, Power, and Temp Monitoring 

• Automatic Transfer Switch 

• RS232 or Network Interface 120/208VAC 10, 20, 30A Models 

• Turn On, Off, or Reboot any or All Receptacles 


(800) 523-2702 


^ i i : \ ^ 

HP StorageWorks 6000 Series 

Virtual Tape Libraries 

Models: VLS6510, VLS6518, VLS6840, VLS6870 

Up to 70TB of HD Storage and 600MB/sec Transfer Speeds 

Use Your Existing Backup Software 

HP Warranty 

Fantastic Low Pricing On These New Units 
To Learn More, Visit: 



Magnext Ltd. 

(888) NOW-TAPE (669-8273) 
(614) 433-0011 



Street Address: 

City, Stat e, ZIP Code: 
Phone: ( ) 


IVIethod Of Payment: 

□ Check 

□ Visa 

Credit Card # 





I Phone: ( 

L Fax: ( 

□ IVIoney Order 

□ Discover 

□ IVIastercard 

□ American Express 




Color picture 

Detailed product 

■ Web exposure 
. Only $176 an issue 
(12-issue minimum) 
• Proven publication 

BiiBd Your Brand 



See us en the 
internet at: 


Call Today: (800) 247-4880 

Page 16 

September 26, 2008 

Product of the Week 

S af e Tape 
Media Disposal Combines 
Green Services With Security Guarantees 

by Bruce Gain 

IT ADMINS GENERALLY know by now that 
getting rid of old electronics equipment 
involves more than just having it hauled off 
with little concern about where it ends up 
as long as it no longer remains on the 
premises. Yet the importance of properly 
disposing of and recycling storage tape and 
other electronics media is not some- 
thing that CTOs, admins, and others in the 
IT field necessarily think about a lot. 

Unfortunately, though, making sure stor- 
age tapes and other electronics equipment 
is properly disposed of is something that 
merits a lot of concern. Breaking environ- 
mental laws, for example, can lead to civil 

li^ecv cleYourMedia 

RecycleYour Tape 
Media Disposal 

Description: takes 
on unused or obsolete media, wipes it for 
guaranteed security, and safely disposes of it 
or recycles it where possible — an environ- 
mentally friendly alternative to destroying or 
dumping material. 

Interesting Fact: 
offers its disposal and recycling services on a 
nationwide basis. 

(877) 798-2737 

penalties and, in some cases, criminal prose- 
cution. Security risks for which admins can 
be liable are vast, yet many enterprises are 
unaware of what is at stake; most executives 

handling and the fact that we go above and 
beyond the typical standards of secure end- 
of-life data solutions," Musil says. 

The firm's mission is to meet the 
needs of a market space that has evolved. 
"The IT recycling market itself has been 
rapidly growing over the last several years. 
Companies are becoming more aware of 

in large U.S. firms, for example, are unaware 
of the risks involved with not heeding envi- 
ronmental laws and the costs of proper elec- 
tronics disposal, according to a survey by HP 
Financial Services, the leasing and financial 
services subsidiary of HP ( 

Then there are the environmental con- 
cerns of tape and electronics waste dispos- 
al. According to U.S. EPA (Environmental 
Protection Agency) statistics, about 235 
million units of electronics products sold 
between 1980 and 2007 had accumulated in 
storage as of 2007. Electronics recycling is 
starting to have an effect on eliminating the 
amount of the waste that ends up in land- 
fills now that several states have passed 
legislation mandating recycling. But while 
the percentage of electronics recycling is 
increasing, the EPA says, the recycling rate 
only increased to 18% from 2006 to 2007. 

Responsible Recycling 

Seeking ways to recycle tape media 
instead of dumping the media in a landfill 
is one way admins can play a part in elimi- 
nating electronics waste. To that end, (877/798-2737; offers envi- 
ronmentally friendly tape disposal with 
strict data security guarantees.' s service is 
unique because "it is 100% environmental- 
ly friendly," says Brian Musil, senior stor- 
age acquisitions manager and data eradica- 
tion specialist for 
"We shred the data and not the reusable 
tape cartridge." 

Then there are the security guarantees offers. "Another 
unique part of our service is the extensive 

being 'green' and doing their part to help 
the environment," Musil says. "Due to the 
growth and need for secure data eradica- 
tion, our standards and practices have had 
to become better, safer, and more secure." 

The Security Guarantee 

The principle concern of many admins is 
to make sure that their data stored on tape is 
safely and securely removed once they sur- 
render it to a third party during the disposal 
process. Doing one's part to help reduce 
landfill waste and to seek environmentally 
friendly options when getting rid of old tape 

shipped as they arrive in its warehouse, 
which says is 
locked down and protected by alarm sys- 
tems. then emails 
the photos to the enterprise to verify that 
the packages have not been tampered with 
during the transit. The tapes received 
are also checked against the purchase order 
list to make sure nothing is missing. Then, 
the data removal process is scheduled as 
soon as the equipment arrives.' s data removal 
process is a key element in its offering, 
which the firm also says distinguishes it from 
the competition. "Many competitors will bro- 
ker out to third parties or not fully erase the 
data but just erase enough to be able to resell 
an inferior product," Musil says. "This is 
very dangerous to your company to leave 
your clients' confidential information in the 
hands of a third party, and you should always 
deal with a reputable company that will fully 
eradicate all of the data." 

Indeed, Adam S. Lewis, a computer spe- 
cialist for WTW Architects (www.wtw, believes proof of security 
and compliance is vital to a good disposal 
and recycling company and appreciates' s documenta- 
tion. "They give a certificate saying that the 
data was deleted in a legal way," Lewis says. 

The Environmental Factor' s policy is to 
also assure that tape is recycled whenever 
possible. For example, the firm's process of 
deleting data but recycling the reusable 
tape cartridge serves as an environmentally 
friendly alternative compared to merely 
destroying the entire tape, Musil says. "The 


"Many competitors will broker out to third 
parties or not fully erase the data but just erase 
enough to be able to resell an inferior product." 

-'s Brian Musii 


is important, of course. However, security 
risks involved in electronics disposal in 
general remain a key concern, especially 
when storage media is involved. 

"[You need] to know when using that you are using 
a company . . . focused on safely and 
securely eradicating data on tape media," 
Musil says. "We meet and exceed standards 
on all laws, acts, policies, and compliance 
that deal with secure data eradication."'s security cer- 
tificate guarantees that the data removal 
process adheres to a strict protocol. For 
example, the firm takes digital images 
of the packages in which the tapes are 

manufacturers state that these tapes have a 
life expectancy of 1 million passes, but 
average data centers will not even come 
close to using the tape media to its actual 
end of life," Musil says. 

WTW's Lewis points out that Recycle- offers solutions that are 
more beneficial for the environment com- 
pared to firms that will just pick up and 
dump your storage tapes. "It is nice to know 
that [our old tapes] are not going to go in 
some landfill. It is actually going to be 
reused or disposed of properly," Lewis says. 

A firm with accessible information and 
guarantees about recycling as well as secu- 
rity is hard to find, Lewis says. 



Wher^ you post a free Want-To-Buy 
or For-Sale Listing at 

you save more thar^ time. Hur^dreds 
of the nation's leading computer 
dealers will see your posting and 
let you know if they have the 
equipment you are looking for. 

September 26, 2008 

Page 17 

Product @ Releases 

Do you have a new product 

that data center/IT managers would 
be interested in learning about? 

Send your press release or related product information 


■ 2X released 2X ThinClientServer version 
6, which includes a new user-friendly Web- 
based management console and features for 
enhancing the performance and functionality 
of the thin client OS and management sys- 
tem. The 2X ThinClientServer deploys a 
small-footprint Linux-based OS to popular 
thin client devices and to old or new PCs and 
laptops. The thin clients always boot the lat- 
est version of the OS from the Thin- 
ClientServer or locally, and hardware and 
connection settings can be retrieved from the 
server when the client logs on. Version 6.0 
features support for automated grouping of 
thin clients, improved booting time for all 
types of 2X OS clients, and load balancing 
and high availability for PXE booting. 

■ AppSense announced Environment 
Manager 8.0 for VMware VDI (Virtual 
Desktop Infrastructure) to bring industrial- 
strength policy and personalization capabil- 
ities to VMware VDI customers. AppSense 
Environment Manager 8.0 enables desktop 
policy and personalization management 
from one location to complement VMware 
VDI environments. The software offers a 

one-to-many pooled VDI that dynamically 
personalizes the user environment on- 
demand, which helps accelerate and simpli- 
fy enterprise migration and management of 
VMware VDI environments. Other advan- 
tages include the reduction of enterprise 
storage and infrastructure costs. With the 
AppSense Environment Manager 8.0, IT 
staff can separate user data from the desk- 
top and remove the need to treat each envi- 
ronment as a unique entity. 

■ A new low- wattage Linux device is avail- 
able from Chip PC. The Xtreme PC LX 
thin client packs policy-based management 
capabilities into a cold RISC architecture 
based on the RMI Alchemy Aul250 proces- 
sor. With domain authentication and Active 
Directory management features, the Xtreme 
PC LX can replace less power-efficient PCs 
in VMware, Microsoft, and Citrix virtual- 
ization servers, the company says. 

■ Configuresoft has announced Con- 
figuresoft Compliance Checker, a free 
downloadable utility that helps VMware 
customers ensure the compliance of security 
guidelines across their ESX virtual 
infrastructures with industry standards. 

Compliance Checker provides real-time 
compliance assessment of multiple ESX 
hosts against the VMware Infrastructure 3 
Security Hardening Guidelines and the CIS 
(Center for Internet Security) VMware ESX 
Server Benchmark. It also delivers compli- 
ance assessment and audit-quality reports 
for multiple ESX hosts at a time, testing 
compliance against more than 250 rules. 

■ New features have been added to the 
EMC Replication Manager program, which 
include the data protection capabilities for 
VMware Infrastructure. EMC array-based 
replicas are managed automatically under 
Replication Manager, which helps hasten 
backups for a more comprehensive report, 
saves time, and increases staff and comput- 
ing resources. Replication Manager now 
manages copies and recovery of physical 
and virtual environments via a single con- 
sole, and VMware VMFS is directly inte- 
grated, allowing for quick VMFS-level 
backup and virtual machine-level restore. 

■ NetApp announced offerings for VMware 
customers, including enhanced NetApp 
FlexClone technology; PAM (Performance 
Accelerator Module); VM Insight Plug-in for 
VMware VirtualCenter; and the NetApp 
Storage Solution for VMware VDI (Virtual 
Desktop Infrastructure), a combination of 
hardware, software, and services that enable 
VMware customers to do large-scale virtual 
desktop deployments. NetApp 's FlexClone 
technology has been enhanced to enable 
rapid, space-efficient cloning of volumes, 
LUNs, and individual files. NetApp PAM is 
an intelligent-read cache that improves virtu- 
al desktop performance for end users. 
NetApp 's SANscreen VM Insight software 
provides VMware customers with end-to-end 

visibility into their virtual infrastructures, 
allowing storage and server administration 
teams to more easily manage their overall 
storage and server architectures in tandem. 

■ The B400 series of mono printers with 
standard duplexing is now available from 
OKI Data. The series includes the B410d, 
B410dn, B430dn, and B420dn, which are 
designed to offer enough different configu- 
rations to satisfy any mono printing needs. 
Intended for use in small and home offices, 
the B400 series printers are designed for 
low cost of ownership, affordable pricing, 
and speed. Features include high duty 
cycles up to 70,000 pages, print speeds of 
30 pages per minute, and resolution up to 
1,200 X 1,200 dpi. 

■ Wyse Technology and Novell announced 
Wyse Enhanced SuSE Linux Enterprise, the 
next generation of the Linux operating sys- 
tem designed for thin computing environ- 
ments and available only on Wyse desktop 
and mobile thin client devices. Integration 
with Microsoft Active Directory and driver 
and software support will enable enterprises 
to deploy Wyse Enhanced SuSE Linux 
Enterprise thin clients in a Windows envi- 
ronment. The OS includes built-in support 
for Wyse's suite of virtualization software, 
enabling enterprises to take advantage of 
third-party desktop virtualization solutions 
such as Citrix XenDesktop and VMware 
VDI (Virtual Desktop Infrastructure). Wyse 
Enhanced SuSE Linux Enterprise includes 
the GNOME desktop, Firefox browser, a ter- 
minal emulator, and prebuilt technologies 
for connecting to thin computing architec- 
tures. It will be available preloaded on Wyse 
thin client devices in the fourth quarter. 
Go to Page 18 


August 8, 2008 

Networking & VPN 

August 8, 2008 

Enhanced CA Records 
Management Solution 

Helps Companies Streamline Records-Keeping Processes 

HWvi Vi|lllinmBP_DOSVjI<;i 


CA Records Manager provides access to all content through a single 

CA Records Manager rl2 is the latest 
version of the company's tool to help 
enterprises automate record-keeping 
processes. The program is designed to 
give users faster access to information, 
save time and money, and facilitate com- 
pliance with regulatory requirements and 
organizational policies. This new version 
delivers increased functionality with its 
records retention and disposition module, 
a localizable Web client, and added fea- 
tures to enhance the user experience. 

CA Records Manager rl2 is also certi- 
fied by the United States DoD (Depart- 
ment of Defense) against the newly updat- 
ed version 3 of the U.S. DoD 5015.2 stan- 
dard, which provides for greater data 
security and integrity. Because of its long 
history of early and successful standards 

adoption, CA was the first to 
certify against the new, more 
stringent standard. 

"One of the most important 
new features in Records 
Manager rl2 is the creation 
of an enhanced retention 
module that is an interface to 
perform all administrative 
tasks related to retention and 
disposition," says Reed Irvin, 
vice president of product 
management for CA. "Addi- 
tionally, this release also delivers signifi- 
cant enhancements focused on creating 
transparency, declaring records more 
efficiently, improving the user experi- 
ence, and applying policy on all content 
across the enterprise. For instance, new 
scripted email notification capabilities 
are designed to send an email notifica- 
tion to selected recipients when your 
specific defined criteria are not met 
within a specified time frame." 

CA Records Manager r12 

Records management solution designed to lielp 
enterprises improve efficiency, automate processes 
and reduce risl< 

(800) 225-5224 


On-Demand Load Testing 

AlertSite Provides SaaS Testing To Improve 
Web Site Stability Before Launch 

Response Time per URL 

6.1 Page it V. Start Page 


: : : ; : : : : : «n « 

Url 3 

Url ? 

Url li OCT tittp://v«Ui7>r.«l<rt>i.t«.csa!fO^ 

UKl a 1 GST littp.//y«llo».«la«L»lte.eciffliSO/fjiv ieen , i«i 

UeI 3t GET bcKp://y«lIaw.aIeEtBite.cQa:id/at,yL«s.eaft 

Url 4: GET http://rinllDw.alartBlta.c»i:e0^ji«/JlC_or7aga. ja 

Ifrl i; iSi http://yi*ll!w<«l«rtiit*,eo(«!80^i™gM/(Hww_feitTir*_iil_iMil,3pg 

ml 6t GET https //ifellow.aiertfllte.eoai:40/JiJBaflaa./hoiiia_£eatufe_ql_ao jaellek. 3pfl 

Url ?: GET http://]rellow.aliirtiite.c»i:A0^u»9«s/h«ia_fa4ture_ql_slu;oaplian.ip? 

Ifrl 8; tJET http: i'/ifi*llo«,«l*^i™g«i/hflM_f«Btuir*_ql_p**l!|s»rfsr™, jpg 

AlertSlte's On-Demand Load Testing offers immediate 

Web sites are launched every day, but 
it's Hkely many have httle or no idea if the 
site will be able to handle the loads it will 
encounter. The result is many Web sites 
experiencing errors that could have been 
avoided with some robust load testing. 

AlertSite addresses this need with the 
release of On-Demand Load Testing, a 
SaaS (software as a service) application 
that is designed to offer businesses quick, 
simple, and intuitive load testing that 
simulates actual user loads. On-Demand 
Load Testing is designed to help compa- 
nies identify scalability issues, bolster the 
infrastructure, and prevent site crashes so 
customers never experience downtime. 

By leveraging AlertSite' s DejaClick 
technology, which simplifies the testing, 
design, and setup processes, virtually 

any user can build and deploy a load 
test easily and review the results 
quickly. Users can log on from any- 
where in the world and quickly test. 
There is no need for learning a 
scripting language or acquiring spe- 
cial equipment software or extra 
personnel, which saves companies 

On-Demand Load Testing works 
by simulating Web traffic from 
thousands of simultaneous users. 
Once the test is complete, the results 
are instantly generated into an on- 
demand report that shows a break- 
down of Web site performance over 
time. Users can test URLs at any time, 
indicate the number of concurrent virtual 
site visitors, and even specify the time of 
day when automatic testing is per- 
formed. Users can reuse the scripts that 
are created from this process at any time 
and as often as needed. 

AlertSite On-Demand Load Testing 

Pay as you go; prices vary according to needs 

On-demand load testing for Web sites to improve 


(877) 302-5378 


Page 18 

September 26, 2008 

Product @ Releases 


on timo? 

Processofs print issue and 
Web site offer an unbeatable 

When you're looking for product or buying 
information, turn to the print issue for a 
wide variety of current products from our 
list of hand-selected manufacturers and 
resellers, along with articles and 
information to help you stay on top 
of the industry. 

Ready to buy? Turn to our Web site to find 
companies offering the products and 
services you need. 

Prnilucts. Ntwl tnHsramtinn Oj^i Cinlen Cj« TiuiL Sinei- If 

Security Tips 

ForTlieSME ^im^mM 

I I'ih'usiii]:<)fi llitHt'lop tivt' lvtut> ('»iild Mv 
I li t F»u tiiH >r I 'ri nil 1 1 mir l>jtii (.'ui kr Ntiib, 

Continued from Page 1 7 
Wyse Technology also announced WDM 
(Wyse Device Manager) 4.7, a software 
management suite for thin clients that pro- 
vides the tools IT administrators need to 
track each hardware device and accompa- 
nying software in their organizations. The 
software can support 100,000 or more 
simultaneously connected units. Wyse 
added new security features to WDM 4.7 to 
increase the protection of customers' IT 
infrastructures. Designed to meet high lev- 
els of security requirements for networks 
carrying financial transactions, WDM 4.7 is 
fully encrypted for network traffic and 
offers secure device management features, 
including self-signed HTTPS Certificate 
Authentication, secure imaging through 
HTTPS, and imaging through HTTP/FTP. 
WDM 4.7 will be available in both work- 
group and enterprise editions, and both edi- 
tions include database support, automated 
shutdown and wake-up, and remote execu- 
tion and control. WDM 4.7 Enterprise 
Edition, for large organizations, also 
includes secure device management, dis- 
tributed architecture for scalability and 
security, improved network interoperability, 
and comprehensive device configuration 
and policy management. WDM 4.7 
Workgroup and Enterprise software editions 
will be available at the end of this month. 

Additionally, an updated Virtualization 
Software suite intended to provide USB 
peripheral and multimedia capabilities 
designed for Wyse thin clients connected to 
virtual desktop environments from Citrix, 
VMware, and Microsoft is now avail- 
able from Wyse Technology. TCX USB 
Virtualizer 2.0 (beta) and TCX Multimedia 
3.0 software are part of the updated suite 
and support Windows Vista virtual ma- 
chines running on VMware VDI, Citrix 
XenDesktop, and Microsoft Hyper-V. They 
are designed to provide support for isochro- 
nous devices and grant end users access to 
a large variety of authorized USB devices. 

Messaging & Telephony 

■ Comodo has announced its free email 
protection system, SecureEmail 1.1, which 
allows private users to apply PKI-based 
technologies to encrypt and digitally sign 
emails. SecureEmail features automatic 
certificate exchange, installation, and 
updates and a built-in wizard for easy sign- 
up and installation of a Comodo Free email 
certificate. It is compatible with Microsoft 
Outlook 2000 and above. Outlook Express, 
Windows Mail, Incredimail, Mozilla 
Internet Mail, Thunderbird, and other 
S/MIME-capable email systems. 

■ Software announced 
its mobile solution, Add2Exchange Enter- 
prise Sync Suite v5.9, which allows 
Windows Mobile smartphone. Pocket PC, 
and BlackBerry users to access and sync 
Exchange public folders such as Outlook 
calendars, contacts, and tasks. Once in 
place, users can access their information 
any time, anywhere, and on any device. 
Add2Exchange includes three modules: 
Add2Exchange for Calendars, Add2- 
Exchange for Contacts, and Add2Exchange 
for Tasks. 

Put the power of Processor \o work for you 

■ GSX has launched the GSX Monitor v9, 
a version of its server monitoring and 
reporting solution. The GSX Monitor v9 is 
designed to provide enhanced email uptime 
for organizations that have heterogeneous 
unified communications server environ- 
ments. Features include the ability to fore- 
see reporting and analytics in order to warn 
IT personnel of looming risks in real time; 
reports and graphs that summarize past 
trends on a daily, weekly, and monthly 
basis; and remote access. GSX Monitor v9 

also manages Exchange, Sametime, Web, 
and BlackBerry servers without repetitive 
monitoring tasks. 

■ Panasonic has announced its line of i-Pro 
network video surveillance solutions. The 
line of management and control solutions 
include i-Pro WV-ASX400 Management 
Software, which accommodates up to 1,024 
cameras, 128 recorders, and 64 decoders; 
the WJ-GXD400 Multichannel High 
Definition Video Decoder, which has an 
HDMI interface and accommodates 256 
cameras; the WV-NF302 Ruggedized 
Megapixel Day/Night Fixed Dome Network 
Camera, which features a 1,280- x 960- 
megapixel image sensor; the WV-NP304 
Megapixel Day/Night Network Camera, a 
box camera similar to the WV-NF302; and 
the WJ-ND400 Network Video Recorder, 
which provides MPEG-4 and JPEG record- 
ing and accommodates up to 64 cameras. 

■ Polycom announced the Polycom DMA 
(Distributed Media Application) 7000, a 
network-based application that manages 
and distributes multipoint video calls with- 
in an enterprise network environment. 
Deployed on application servers, the DMA 
7000 application manages and distributes 
video calls in a reliable and scalable 
method across multiple Polycom RMX 
2000 media servers, which are videoconfer- 
encing bridges that allow multiple sites to 
join the same meeting, connect users on 
different networks, and optimize the call 
experience between video endpoints with 
different capabilities. Advantages of the 
Polycom DMA 7000 include cost-effective 
scalability, improved reliability and fault 
tolerance, and simplified video network 
administration. Polycom DMA 7000 is 
planned for general availability in January. 

■ Proginet has announced Slingshot Vault, 
its new solution to manage the space, securi- 
ty, and bandwidth challenges associated 
with email attachments. Integrated with 
Slingshot Vault is Intradyn's deduplication, 
archiving, and e-discovery technology, 
which will allow users to send attachments 
of any size, archive them, and audit them for 
regulatory compliance on-demand. Slingshot 
Vault also provides security by encrypting 
attachments while in transit to the recipient. 

Networking & VPN 

■ Astaro released Version 1 .9 of the Astaro 
Command Center, its central management 
software that allows Astaro customers to 
monitor and manage up to 250 Astaro 
Gateway appliances from a single point. 
Version 1.9 offers improved performance 
and greater scalability for larger environ- 
ments, and it is based on the same sys- 
tem architecture as the Astaro Security 
Gateway. The Astaro Command Center's 
monitoring functions make it convenient to 
centrally manage several customers' securi- 
ty installations and permissions. For 
instance, you can view hardware compo- 
nents, network loads, and running services 
of all connected gateway devices from a 
central dashboard. Trend indicators help 
administrators to predict how important sys- 
tem parameters will develop. Yahoo! Maps 
is also integrated to provide the precise geo- 
graphic location of all managed gateways. 

■ Blade Network Technologies and 

ipoque, a European traffic management 
solution provider, have teamed up to deliv- 
er a NEBS -compliant deep packet inspec- 
tion and bandwidth management applica- 
tion appliance platform. The technology 
runs on IBM BladeCenter and is designed 
to run in high-traffic environments and 
guarantee quality of service for quadruple- 
play networks consisting of data, voice, 

September 26, 2008 

Page 19 

Product \^ Releases 

multimedia, and video traffic. The applica- 
tion appliance platform has Blade's Nortel 
10Gb Ethernet Switch Module and is capa- 
ble of up to six 10Gb Ethernet links and up 
to 60Gb and 4.2 million packets per second. 

■ BMC Software has introduced a new 
version of BMC Control-M with Workload 
Lifecycle Management. The software is 
designed to simplify enterprise job schedul- 
ing and improve service to the end user 
while also reducing costs. BMC Control-M 
augments BMC's offerings in the realm of 
IT workload automation and business ser- 
vice management. Features of BMC 
Control-M include the ability for customers 
to manage batch processes with more con- 
trol and flexibility, version control, change 
identification, and virtualization capabili- 

■ Cisco introduced three Cisco MDS 9000 
Family 8Gbps Fibre Channel switching 
modules and new capabilities in Cisco's 
SAN operating system, NX-OS. The Cisco 
24-Port 8Gbps Fibre Channel Switching 
Module is ideally suited for storage net- 
working environments and supports hard- 
ware-based separation of Fibre Channel 
and FICON traffic. The Cisco 48-Port 
SGbps Fibre Channel Switching Module 
features 48 auto-sensing l/2/4/8Gbps ports 
best for highly virtualized servers in enter- 
prise-class data centers. The Cisco 4/44- 
Port 8Gbps Ho St- Optimized Fibre Channel 
Switching Module offers four 8Gbps ports 
and 44 4Gbps ports to consolidate stan- 
dard servers with fewer SAN switches. 
The new offerings should be available by 
Q4 of this year. 

■ Cisco and VMware announced a joint 
venture to develop data center solutions 
that will improve the scalability and opera- 
tional control of virtual environments. The 
Cisco Nexus lOOOV distributed virtual 
software switch, an integrated option in 
VMware Infrastructure, features Cisco 
Virtual Network Link technology to help 
networking administration managers. 
Cisco and VMware also teamed up to offer 
virtualization consulting services, includ- 
ing the Virtualization Assessment Service 
and the Planning and Design Service. The 
Cisco Nexus lOOOV software switch will 
become available in the first half of next 

■ Enterasys Networks has introduced 
Enterasys SecureStack C3, made for 1Gb 
and 10Gb Ethernet access at the network 
edge. The Enterasys SecureStack C3 
offers enhanced QoS features that auto- 
matically discover, classify, and prioritize 
voice, video, and data applications. These 
applications include IP telephony, HD 
videoconferencing, and business intelli- 
gence analytics. Availability is provided 
by redundant power supplies, and network 
devices that need external power are sup- 
ported by standards-based IEEE 802. 3af 
PoE options. WYSIWYG identity-based 
policies are designed to deliver SLA 

■ GlassHouse Technologies has intro- 
duced a suite of Managed Services for 
Virtual Environments, which is designed to 
produce advanced visibility, monitoring, 
and reporting of customers' virtualized IT 
environments. An enhanced management 
interface provides the services using virtu- 
alization management software from 
Tek-Tools Software. The suite of Managed 
Services for Virtual Environments offers 
monitoring and reporting capabilities 
that help users get the most from availabil- 
ity, track system configurations, and man- 
age utilization. 

■ HP has introduced new products and ser- 
vices that support VMware technologies in 
regards to management software, virtual- 
ization services, VDI, and server and stor- 
age infrastructures. HP Data Protector soft- 
ware is designed to centralize automated 
data protection and make it easier to recov- 
er lost information. 

HP also launched HP Data Protector 
Zero Downtime Backup and Instant 
Recovery that work with HP StorageWorks 
Enterprise Virtual Arrays, which are all 
available for VMware environments. HP 
Insight Dynamics-VSE was also introduced 
to increase data center efficiency, along 
with HP VEI (Virtual Exchange Infra- 
structure) Services designed to maximize 
the capabilities of VMware and Microsoft 
Exchange 2007. 

■ Northwest Performance Software has 

announced NetScan Tools Pro 10.70, its 
new network discovery and information- 
gathering toolkit for network administra- 
tors, security specialists, network training 
instructors, and law enforcement investiga- 
tors. NetScan's new features include 
enhanced DNS query tools, which are 
designed to help trace the chain of DNS for 
both IP addresses and host names. There 
are also improvements to email validation, 
operating system fingerprinting, packet 
generation, traceroute, and port scanning. 
NetScan now also runs on Microsoft 
Windows 2000/2003/XPmsta. 

■ porttracker has announced porttracker 
v2.0, a network management appliance 
that allows network managers to quickly 
track and report on what devices are cur- 
rently or have previously been connected 
to their network, porttracker' s features 
include expanded vendor support, audit his- 
tory, and scheduled reporting, porttracker 
is available as both a hardware appliance 
and a downloadable version and is compat- 
ible with a number of switch devices 
such as HP Procurve, 3Com, Cisco, and 
Extreme Networks. 

■ Stampede Technologies announced the 
Stampede RCO (Remote Campus Op- 
timizer). Designed to optimize efficiency 
for application traffic flow between data 
centers and remote locations, the new 
Stampede RCO will be available to OEM 
partners in the fourth quarter. Stampede's 
new RCO runs on Linux appliances and 
makes WAN access more like LAN access 
by facilitating easier, more responsive, 
and more efficient remote user application 
access. The RCO accelerates most traffic 
between a remote branch and a data center 
by sitting inline as a transparent bridge. 
The RCO runs on a dedicated appliance 
with special network hardware that 
enables it to go into pass-through if taken 
out of service. The RCO accelerates multi- 
ple protocols, including HTTP, MAPI, 
CIFS, FTP, P0P3, and SMTP. Working in 
conjunction with the Stampede Accelera- 
tion Series, the new RCO enhances accel- 
eration by combining protocol-specific 
optimization techniques along with com- 
pression technology and Stampede's 
Turbo streaming. The RCO makes remote 
application use four to 10 times faster and 
more efficient, reducing bandwidth usage 
by 70 to 90%. 

■ Symantec launched the beta release of 
Symantec Online Remote Access, which is 
an offering that enables users to securely 
access files and applications on their com- 
puters from any Web-connected PC. 
Symantec Online Remote Access is built 
around the firm's pcAny where platform 
and features a Web-based centralized con- 
nection model, real-time remote control. 
Go to Page 20 

Encryption ^ 
isn't just for 
Secret Agents. 

The ABS-Secure Backup System 

AES Full Disk Encryption 


www. cmsproducts. com 


From the Makers ofDiskeeper® 


withlnvisiTasking- 2009 

If you've never had a frantic executive call you in despair about a file they 
accidently deleted, pleading with you to recover it from a black hole, 
consider yourself lucky. For the rest of us, there's Undelete 2009 with 
InvisiTasking technology. 

Undelete fills the critical gap in your data protection strategy, ensuring no 
data is ever accidently lost— period. Even saved over versions of Microsoft® 
Office files are safe. No longer will users cry about having saved over their 
spreadsheets. Just a few clicks of the mouse and your files are back. And 
with the Desktop Client feature of Undelete, users can recover their files 
on their own— so you can get back to the important stuff, like building out 
your high-availability mail cluster (or working on your golf swing). 

Rapif^Tlmo Pi-otprtinn R/pptLUmo Uanr\%far%f 

Try it free at 


© 2008 Diskeeper Corporation. All Rights Reserved. Diskeeper, Undelete, InvisiTasking, Real-Time Protection. Real-Time Recovery., and ttie 
Diskeeper Corporation logo are trademarks or registered trademarks of Diskeeper Corporation In the United States and/or ottier countries. All 
other trademarks or brand names are the property of their respective owners. Diskeeper Corporation • 7590 N. Glenoaks Blvd. Burbank, CA 91504 
• 800-829-6468 • 

Page 20 

September 26, 2008 

Product @ Releases 

Continued from Page 19 
two-way file transfer, remote printing, 
detailed alerting and reporting, end-to-end 
AES 256-bit encryption, and redundant 
data centers. Interested companies can 
currently sample the beta release of 
Symantec's Online Remote Access at 

Physical Infrastructure 

■ Cisco added several standards-based 
video servers and IP video surveillance 
cameras to its Connected Physical Security 
system portfolio. New modular Physical 
Security Multiservices Platforms are ideal- 
ly suited to one or multiple IP-networked 
sites. The new enterprise-class SD (stan- 
dard definition) indoor and outdoor IP 
Fixed Dome Cameras are available in 
wired, wireless, indoor, outdoor, box, fixed, 
and pan/tilt/zoom formats. Cisco's Video 
Surveillance Stream Manager also supports 
matrix switch and keyboard input. The 
Cisco IP Fixed Dome Cameras will be 
available in December. 

■ Eaton has developed a line-interactive 
UPS targeted toward IT assets such as 
switches, routers, servers, VoIP devices, and 
workstations, as well as telecommunications 
systems, such as EDGE, 3G, and WiMAX 
wireless equipment. The Eaton 5130 UPS 
comes in 1,250 to 3,000VA models in 2U 
and 3U rack and tower form factors. Run 
time can be augmented via hot-swappable 
batteries and add-on external modules. 

■ The third generation of the GigaVUE 
2404 high-density data access switch has 
been introduced from Gigamon. The 
switch is an implementation of Gigamon' s 

DAN (Data Access Network) and is 
designed for advanced aggregating, repli- 
cating, mapping, and packet filtering and 
features 24 10Gb Ethernet ports, four 1Gb 
Ethernet ports, and a low-profile 2U chas- 
sis. Due to the modular design of the 
switch, network managers can deploy the 
exact number of ports necessary to accom- 
plish specific IT goals. 

■ National Instruments launched its 
Lab VIEW SDI-12 Application Program- 
ming Interface software, which lets NI 
Lab VIEW graphical system design plat- 
form users manage environmental monitor- 
ing sensors. The Lab VIEW SDL12 API is 
ideally suited to the environmental mea- 
surements in research, engineering, and sci- 
ence applications in a laboratory setting or 
remote installation. Interested users can 
download the Lab VIEW SDI-12 API free 
from the NI Instrument Driver Network at 

■ Staco Energy Products released its 
UniStar P series single-phase online UPS 
in tower designs. This true online double- 
conversion UPS is available in 6kVA, 
8kVA, and lOkVA models to prevent out- 
ages and irregularities in incoming line 
voltages from 160 to 280VA at 45 to 
65Hz. Up to four UniStar P modules can 
be installed in parallel for redundancy or 
additional capacity. Each UniStar P fea- 
tures high overload handling without trans- 
fer to the bypass, along with protection 
against short circuit and over-temperature 
conditions. The Smart Battery Man- 
agement System continuously monitors 
battery status and recharges whenever nec- 
essary. Hot-swappable battery packs allow 
users to change batteries without shutting 

down the UPS. Standard software is 
compatible with Windows 98/Me/NT/ 


■ Aladdin Knowledge Systems announced 
Aladdin eToken PKI Client 5.0, software 
that provides an enhanced framework for 
creating a secure method of exchanging 
information based on public key cryptogra- 
phy. eToken PKI Client 5.0 for Windows 
will be followed shortly by versions for 
Linux and Mac later this year. Features of 
version 5.0 include an enhanced Password 
Complexity Module that allows the user to 
determine password complexity, improved 
management capabilities, and ease-of-use 
updates. eToken PKI Client 5.0 allows 
administrators to configure two permis- 
sions sets — one for administrators and 
another for nonadministrative users. 
Permission for each item of the PKI 
Client's properties can be tagged separately 
for different levels of users. Users can also 
now delete stored data objects, such as cer- 
tificates or SSO profiles, without entirely 
initializing the token. 

■ Catbird announced version 2.0 of V- 
Security, software that provides protection 
for VMware. V-Security is a noninvasive 
SO A for virtual and physical networks that 
offers cross-platform coverage, including 
Rogue VM Quarantine Network Access 
Control; Sprawl Management and Control, 
Intrusion Prevention, and Intrusion 
Detection; Policy Compliance and En- 
forcement; Vulnerability Monitoring; and 
Auditing Compliance. Unlike conventional 
host-based and proprietary hardware solu- 
tions. Catbird's stateless architecture is 

fully SO A- and cloud-based, 100% plug 
and play. Web-enabled, and designed to 
have minimal impact on the virtual envi- 
ronment. Version 2.0 includes TrustZones, 
which are logical groupings of VMs that 
share a predefined common set of policy 
and compliance rules. There's also a 
Catbird Control Center that provides a 
management console for V-Security 2.0. 

■ McAfee has delivered a secure virtualiza- 
tion solution, McAfee Total Protection for 
Virtualization. The solution extends securi- 
ty across virtual and physical environ- 
ments. Optimized for the VMware plat- 
form, McAfee Total Protection for 
Virtualization delivers layered protection 
for all virtual machines, a single manage- 
ment console, automatic updates, and 
automated compliance reports. McAfee 
Total Protection for Virtualization includes 
the following core components: McAfee 
VirusScan Enterprise and McAfee Virus- 
Scan Enterprise for Linux, McAfee Vi- 
rusScan Enterprise for Offline Virtual 
Images, McAfee An ti- spy ware Enterprise, 
McAfee Host Intrusion Prevention for 
Server, and McAfee ePolicy Orchestrator. 
Total Protection for Virtualization will be 
available in the fourth quarter. 

■ Symantec introduced the latest versions 
of its data and system protection offerings 
for Virtual Machines and Windows Server 
2008 Environments. Backup Exec 12.5, 
Backup Exec System Recovery 8.5, and 
Backup Exec Infrastructure Manager 12.5 
all feature better storage flexibility for het- 
erogeneous environments. The new releases 
also support Windows Small Business 
Server 2008, Windows Essential Business 
Go to Page 21 


Get the MAX from your VAX! 

Get the MAXimum from your existing VAX investment through Compaq's continued commitment to the 
VAX range of computing products. 

As you are no doubt aware, Compaq has announced the end of production of the VAX platform. 


Compaq recognizes that for many of our customers there will be extensive and long-term support 
requirements for their investments in VAX. Because we value all of our customers, in North America, 
IGS Systems, Inc., will continue to fulfill your VAX equipment needs. The option to buy quality-reman- 
ufactured products is designed to protect your initial IT investment; by ensuring the availability of 
Compaq branded equipment long after the manufacturing cycle has ended. Compaq will continue to 
service VAX at least until the year 2010 and will continue to enhance Open VMS for VAX indefinitely. 


We recommend that you contact this reseller for your used equipment needs. 

IGS Systems, Inc. 

Tel: 508-866-1171 
Fax: 508-866-4500 


For further information on obtaining VAX systems: 

September 26, 2008 

Page 21 

Product @ Releases 

Continued from Page 20 
Server 2008, and SQL Server 2008. Backup 
Exec 12.5 and Backup Exec System 
Recovery 8.5 will be available next month 
starting at $995 per media server license 
and $1,095 per server license. The Backup 
Exec Infrastructure Manager 12.5 will be 
available later this year starting at $1,995. 

■ Keep your data center secure and in com- 
pliance with Tripwire Enterprise v7.5 from 
Tripwire. The product gives you central 
control over internal and external policies, 
even in a virtualized and heterogeneous 
environment. Tripwire Enterprise v7.5's 
change auditing facilitates the management 
of unauthorized virtual machine sprawl. 
Meanwhile, broad support of virtual objects 
helps admins quickly assay the configura- 
tion integrity of just about everything on 
the system. 

■ Data center admins can rest easier know- 
ing that the WatchGuard XTM 1050 is 
on the job. XTM stands for extensible 
threat management, WatchGuard says, and 
with twin quad-core Intel CPUs and 
encryption acceleration in hardware, the 
WatchGuard XTM 1050 seems ready to 
live up to its name. It's capable of 2Gbps 
IPSec and lOGbps firewall throughput, the 
company says. 

■ Websense is set to introduce a unified and 
effective Web and data security offering, 
Websense Web Security Gateway. Based 
on Websense Web Security Version 7, 
Websense Web Security Gateway is de- 
signed to help enterprises embrace and use 
Web 2.0 technologies. Further, Websense 
Data Security Endpoint, a data loss preven- 
tion tool that helps companies prevent data 

loss through hard-to-control devices such as 
USB drives, will also be available. 


■ AEP Networks introduced the AEP 
Netilla SSL VPN Virtual Edition, a 
prepackaged software-only virtual appli- 
ance that streamlines secure remote appli- 
cation access installations on virtual server 
offerings, such as VMware ESX. Netilla 
VE enables enterprise customers and ser- 
vice providers to quickly spin up remote 
access projects on-demand within an exist- 
ing virtualized server infrastructure without 
requiring new appliance hardware. The 
software also lets IT security managers take 
advantage of streamlined hardware mainte- 
nance processes, lower data center power 
consumption, and improved business conti- 
nuity benefits inherent in server virtualiza- 
tion deployments. Netilla VE offers load 
balancing/failover that IT staff can turn up 
at will with the Netilla Load Balancer 
option. The software can also scan to 
assure that client devices maintain corpo- 
rate-standard antivirus, firewall, and other 
requirements prior to access. 

■ Attachmate released Attachmate 
Verastream Host Integrator 6.6, the latest 
version of its mainframe application inte- 
gration tool. Version 6.6 includes features 
and functionality that reduce the technical 
complexity and code generation associated 
with legacy integration to offer IT organi- 
zations a low-risk approach for legacy-to- 
SOA integration. The Verastream Host 
Integrator 6.6 software modernizes main- 
frame functionality to help alleviate many 
of the challenges associated with legacy 
integration. Whether the process is within 

Web, mobile, or contact center application 
solution environments, the Verastream 
Host Integrator can simplify the process. 
The flexible, scalable approach to SOA 
integration quickly and noninvasively ser- 
vice-enables all types of mainframe and 
enterprise host functionality. 

■ Axios announced RefWiz, an analysis 
and documentation tool that provides 
comprehensive information about applica- 
tion element interrelationships for main- 
frame batch and online applications. 
RefWiz improves upon traditional manual 
analysis by providing details that help 
reduce analysis time and increase the 
accuracy of the analysis. RefWiz gathers 
information from JCL, source code, and 
database definitions to build application 
inventories that capture the interrelation- 
ships between different elements, such as 
jobs, procedures, control card members, 
programs, data sets, and databases. 
Additional information is collected from 
the system for both batch and online exe- 
cution history to further enrich the data. 
RefWiz also collects data from SMF 
records, scheduling, and change manage- 
ment tools to integrate it into the reposito- 
ry and provide access to accumulated 
change and usage histories. 

■ Citrix XenServer 5, the latest in a line of 
server virtualization products, has been 
introduced by Citrix Systems. The product 
is designed to better its previous iterations 
with new management capabilities and ease 
of use, ideally making data centers more 
dynamic for users. Features include an 
enhanced open architecture; support for vir- 
tually every storage environment including 
Fibre Channel and iSCSI NAS, DAS, and 

SAN; and support for AMD and Intel 32- 
and 64-bit systems. 

■ Radware announced an optimization 
solution for the virtualized environment, 
VirtualDirector, as part of Radware' s 
Business-Smart Data Center strategy. The 
core of Radware' s Business-Smart Data 
Center strategy is providing its customers 
with tailor-made application infrastructure 
solutions for next-generation data centers to 
help them overcome IT complexities and 
ensure cost-effective procurement and full 
investment protection. VirtualDirector pro- 
vides adaptive and dynamic allocation of 
resources based on business events, which 
can help to guarantee SLAs (service level 
agreements) and improve response time of 
applications. VirtualDirector aligns data 
center operations with business policies by 
dynamically allocating resources on 
demand to serve customers' best needs for 
SLAs in a virtualized environment. In addi- 
tion, to save costs, VirtualDirector opti- 
mizes the use of data center resources to 
generate energy and cooling savings. Key 
advantages obtained from deploying 
Radware' s VirtualDirector in a hybrid or 
fully virtualized environment include 
improved QoE (quality of experience), 
dynamic allocation of resources in real 
time, alignment of network behavior, accu- 
rate estimates and control of VM deploy- 
ment, and reduced risk. 

■ Sun released its Sun xVM Server soft- 
ware and Sun xVM Ops Center 2.0, two 
offerings in its stable of desktop and 
data center virtualization products. Sun 
xVM Server software is an open source 
data center-grade server virtualization 
Go to Page 22 


Same Great 


Our new, easier-to-read 
home page allows you to 
quickly find the information 
you need. 

Page 22 

September 26, 2008 

Product @ Releases 

Continued from Page 21 
product that lets users virtualize and man- 
age heterogeneous workloads from Win- 
dows, Linux, and Solaris operating systems 
on Sun x86 platforms and SPARC-based 
servers. The Sun xVM Ops Center 2.0 
delivers simplified management of virtual 
and physical environments with the added 
benefit of virtual guest management. Sun is 
also offering Virtualization Workshop, 
Virtualization Architecture, and Virtuali- 
zation Implementation services, as well as 
tailored needs assessments. Sun xVM 
Server software is priced starting at $500 
per year per physical server. Sun xVM 
Infrastructure Enterprise Subscription starts 
at $2,000 per physical server per year. Sun 
xVM Infrastructure Datacenter Subscrip- 
tion starts at $3,000 per server per year. 
The latest release of Sun xVM Ops Center 
is available for $100 per managed server up 
to $350 a year. 

Sun also announced two Intel Xeon- 
based servers, the Sun Fire X4450 server 
and Sun Blade X6450 server module. Each 
offering is built around Intel's Xeon 
processor 7400 series, with up to six pro- 
cessing cores. The Sun Blade X6450, 
designed for virtualization and server con- 
solidation, HPC, database, and enterprise 
applications, delivers up to 11 teraflops of 
peak performance per fully populated Sun 
Blade 6048 chassis and 24 memory DIMM 
slots. The Sun Fire X4450 server is a four- 
socket x64 2U server best suited to consoli- 
dating workloads. The server consumes 
33% less watts per core than the previous- 
generation processors and can be enclosed 
in half the form factor of comparable 
servers. Supported operating systems 
include Solaris, Linux, Windows, and 
VMware. The Sun Fire X4450 server and 

Sun Blade X6450 server module will be 
available next month starting at $8,545 and 
$9,455, respectively. 

■ The Tidal Enterprise Scheduler Adapter 
for VMware is the latest offering from 
Tidal Software. It enables Tidal Enterprise 
Scheduler version 5.3 and later to extend its 
central scheduling control to virtual 
machines. Among other things, it allows 
admins to schedule configuration, power, 
and system state snapshot actions within 
the ESX hypervisor, which aids in the 
automation of what is still a manual task in 
many data centers. 

■ Unisys has announced the release of soft- 
ware for the Unisys Infrastructure Manage- 
ment Suite. Additionally, Unisys has made 
available the ES7000 Model 7600R 
Enterprise Server for Xeon six-core proces- 
sors. The Unisys Business Assurance 
Services include the following: Unisys 
Disaster Recovery Architecture Service, 
Unisys Backup Modernization Service, and 
Unisys Data Protection for Backup Service. 
uProvision software allows users to enforce 
compliance and set up software distribution. 
Unisys' disaster recovery solution automates 
workflows and detects failure conditions. 
The ES700 Model 7600R supports up to 96 
processor cores on 16 sockets; it ranges in 
price from $26,430 to $135,000. 


■ Coraid announced the availability of the 
EtherDrive LD2461 Storage Appliance, a 
high-performance RAID storage appliance 
that attaches to an AoE (ATA over 
Ethernet) SAN using 10Gb Ethernet. The 
EtherDrive LD2461 Storage Appliance is 

uniquely suited for virtualization with high 
lOP loads where maximum spindle count 
and minimum rack space are critical. 
Utilizing Coraid' s newly introduced AoE 
driver for VMware' s ESX hypervisor, 
EtherDrive LD2461 supports 24 2. 5 -inch 
SATA disks in a 2U rackmount chassis. 
The new EtherDrive LD2461 was intro- 
duced to meet the specific requirements for 
server virtualization. These applications 
require high lOPs and high throughput, and 
the LD2461 delivers performance of more 
than 500MBps. 

■ FalconStor Software announced NSS 
(Network Storage Server) Virtual Appli- 
ance for VMware ESX, designed to enable 
customers to transform existing direct- 
attached storage into an iSCSI virtual SAN 
appliance for VMware environments. 
Features of the FalconStor NSS include 
storage virtualization, provisioning, man- 
agement, and data protection. Other fea- 
tures include application-aware snapshot 
and replication technology and support for 
Microsoft SQL Server, Exchange Server 
and SharePoint Server, Oracle Database, 
Lotus Notes, Sybase Database Manage- 
ment, IBM DB2, and more. 

■ Isilon has announced the release of its 
fifth-generation clustered storage systems. 
With the release of its OneFS 5.0 operating 
system software, Isilon' s X-Series clustered 
storage systems set the standard for scale- 
out file storage, delivering up to 20GBps 
and 2.3PB of capacity in a single file sys- 
tem and single volume. The release of the 
new fifth-generation clustered storage sys- 
tems includes improved performance, scal- 
ability, and ROI. 

■ New from iStor Networks are 1Gb and 

10Gb Ethernet iSCSI storage products with 
the integraSuite/MC Management Center. 
The latter maximizes the benefits of a virtu- 
alized environment by allowing IT admins 
to abstract logical storage from its physical 
counterpart, the company says. 

■ MicroNet has announced RAIDBank4, 
its storage solution for SMEs. RAIDBank4 
includes MicroNet' s 2-port eSATA PCI 
Express host bus adapter card and NTI 
Shadow backup software and is available 
with a 4-port option. RAIDBank4 features 
a 300MBps data transfer rate and a foot- 
print of only 6.5 x 4.75 inches. RAID- 
Bank4 is available in 2 or 4TB configura- 

■ PlateSpin Forge 2.0 is the latest disaster 
recovery appliance from its namesake. The 
hardware features embedded VMware for 
virtualization purposes. Boasting instanta- 
neous failover protection as well as fail- 
back that's independent of the hardware, 
PlateSpin Forge 2.0 offers multiple recov- 
ery points and expedited recovery to a 
remote location over a WAN. 

■ Western Digital announced that it has 
leveraged 250GB -per-platter technology to 
make its WD Scorpio Blue 2. 5 -inch note- 
book hard drives available in capacities up to 
500GB. The series of drives are available in 
400GB and 500GB capacities. The drives are 
designed to deliver 3Gbps transfer rates with 
extremely quiet and cool performance. 
Proprietary features of the drives include 
WhisperDrive to keep the drives as quiet and 
possible; ShockGuard, which prevents dam- 
age to the platters; and IntelliSeek, which 
calculates seek speeds to run at lower power. 

lUServer- ASAMOli 

1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB 

1GB (2X512MB) 667MHz FBDIMM Installed, 

IX 80GB SATA II 7200 RPM Installed, Max - 4TB, 

IX 4 Port SATA II RAID Controller Installed- 

lU rackmount Chassis, 560Watt PS. 

4 Drive bay, Rails Included. 

Price Starting at: $1265/- 

2U Server- ASA2 12 li 

1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB 
1GB (2X512MB) 667MHz FBDIMM [nstalled, 
6TB (12X 500GB) SATA II Installed, Max - 1 2TB. 
IX 12 Port SATA II RAID Controller Installed. 
2U Rackmount Chassis, SOOWatt Redundant PS. 
12 Drive bay. Rails Included. 
Price Starting at: $4275/- 

3U Server- ASA3 16 li 

1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB 
1GB (2X512MB) 667MHz FBDIMM Installed, 
8TB (16X 500GB) SATA II Installed, Max - 16TB. 
IX 16 Port SATA II RAID Controller Installed. 
3U Rackmount Chassis, BOOWatt Redundant PS. 
16 Drive bay. Rails Included. 
Price Starting at: $4995/- 




5U Server- ASA5241i 

1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB 
1GB (2X512MB) 667MHz FBDIMM Installed, 
12TB (24X 500GB) SATA II Installed, Max - 24TB. 
IX 24 Port SATA II RAID Controller Installed. 
5U Rackmount Chassis, 9 30 Watt Redundant PS. 
24 Drive bay, Rails Included. 
Price Starting at: $7345/- 

8U Server- ASA8421i 

1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB 
1GB (2X512MB) 667MHz FBDIMM Installed, 
2X 80GB SATA II 7200 RPM OS drives Installed 
20TB (40X 500GB) SATA II Installed, Max - 40TB. 
2X 12 Port & IX 16 Port RAID Controller Installed. 
8U Rackmount Chassis, 1300Watt Redundant PS. 
42 Drive bay. Rails Included. 
Price Starting at: $12735/- 

ASA730 1 &ASA7302-X2U-ST2 
Blade Server 

7U rack-optimized enclosure, holds 10 blades 
3+1 redundant 4200W or 6000W or 7500W 
Price Starting at: $4050/- 

For more details please call 


2354 Calle Del Mundo, 
Santa Clara, CA 950S4. 
Phone - (408)-654-2901 
Fax - (408)-654-2910 

Eval Servers Available on request 

Since 1989, ASA has served customers like Cisco, Juniper, Caltech, Fermilab and most 
Universities. We provide total custom server solution with OS of your choice. Excellent 
pre-sales and post-sales support. Reliable hardware at most competitive prices. Please 
call or contact us for your next hardware purchase. 



Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and other countries. 
Price and availability subject to change without notice. Not responsible for typographical errors. All brand names and logos are trademarks of their respective companies. 

September 26, 2008 

Page 23 

Stretching Data Center Dollars 

Extend The Life Of Your Data Center 
& Save Money 

by Curt Harler 
• • • 

Nobody has been promised a fat, care- 
free budget for the rest of 2008. That means 
data center managers must look for ways 
they can extend the life cycle of their cur- 
rent data centers and make more "room" in 
them without adding any more real estate 
or physical space. 

One way to save money is to operate 
more efficiently and effectively. Another 
way to save dollars is actually to move 
computing off site to a service provider's 
location. Both strategies have proven suc- 

"Most companies are not in a position to 
build new facilities, and many cannot relo- 
cate their data center," says Liam McGlynn, 
senior analyst with Enterprise Management 
Associates (www.enterprisemanagement 
.com). "But there are a number of approaches 


For Money Savings 

Look into virtualization. 

Look at data center organization. 

Look at the physical setup of the data center. 

Look at software services: Can someone 
else do it? 

Look at power configurations. 
Look into federation of databases. 

a data center manager can take that will 
extend the life of the data center." 

A data center automation specialist with 
25 years experience, McGlynn' s approach- 
es involve getting more out of existing 
equipment, saving money by using less 
power, and more intense management. In 
the real world, companies are doing just 
that. "Software tools allow you to maxi- 
mize use of data center resources, floor 
space, and power," he explains. 

"The first thing a data center manager 
should look in to is virtualization," McGlynn 
says. Because most servers are typically 
utilized at only 5 to 10% of capacity, virtual- 
ization allows the data center to get more 

"You can often get 10-1 virtualization, . . . 
and that means you will consume less power 
and generate less BTUs (for cooling)." 

The latter is increasingly important in 
many parts of the country where utilities 
are limiting or capping the amount of 
power a data center can get from the grid. It 
also saves money and resources. 

Going Offsite 

An offsite provider can be another alter- 
native to even the most efficient in-house 
computing solutions. Levine Financial 
Group (, a 
Toronto-based firm, provides insurance and 
wealth management services to medical 
and business professionals. In business 
since 1967, the company handles a great 
deal of sensitive information. Data integrity 

and client confidentiality are of paramount 
importance. There is no room for short- 
cuts — but little room for expanding bud- 
gets, either. 

To ensure compliance, Levine Financial 
Group needed to easily back up data from 
its application servers. After implement- 
ing an online backup service, the compa- 
ny was able to centrally back up its data 
and quickly recover lost files to any com- 
puter at any time without compromising 
security. The offsite vendor shoulders all 
of the responsibility for protecting the 
company's data and business-critical 
applications, and Levine Financial Group 
has no ongoing investment in additional 
equipment or real estate while achieving 
its computing goal of having regularly 
scheduled system backups to a remote 

"We had tape backup and mirrored drives 
onsite," says Elliott Levine, director at the 
company, "but we looked at offsite storage 
as a good final solution." 

Not only does the service protect the 
company's data, but it doesn't impose any 
additional demands on personnel. "There 
is nothing for our staff to do. All of the 
backup is handled offsite," Levine con- 
tinues. Levine Financial Group has 
been using the offsite service for almost 
two years. 

"There is nothing I would change," he 
says. "We got the backup we wanted. 
We've had to restore a couple of times. 
They understand it is a stressful situation 
and got us back where we needed to be." 

Levine was able to retain control over a 
vital process while offloading the burden of 
management and space onto someone else. 

Know What You Have 

Because saving money is of little value if 
it comes at the cost of losing control over 
computing assets, another step to consider 
Go to Page 24 

Learn From 
Tlie Big Boys 

Face it, mainframe computers are the bench- 
mark for processing enormous, heteroge- 
neous workloads at near maximum CPU uti- 
lization. Ideally, virtualized server banks 
would approach that capability. In reality, 
they do not. 

"This is because mainframes assign priority 
by processor, memory, I/O," explains Liam 
McGlynn, senior analyst with Enterprise 
Management Associates (www.enterprise 

Server hardware itself cannot accomplish 
this, but there are solutions on distributed 
platforms that allow IT to establish priority 
uses for applications. Managers fight for 
priority access. This is why every department 
wants its own server — an expensive and 
inefficient route to take. 

"Some applications are not ideal candidates 
for virtualization," McGlynn notes. An applica- 
tion that does a lot of I/O is a good example 
of a weak candidate. However, there are 
solutions that run under a single OS and 
allow IT to establish priorities. These tools 
increase the efficiency of server processing. 


August 8, 2008 


Password Management 

Cloakware's Server Password Manager v3.5 Offers 
Upgraded Deployment & Integration Features 

Privileged and A2A (application-to-appli- 
cation) password management is a powerful 
way to maintain security for any company, 
yet many enterprises eschew this protection 
because of its prohibitive cost. Cloakware 
offers a more cost-effective solution to this 

issue with the release of CSPM (Cloakware 
Server Password Manager) version 3.5. 

CSPM is a Shared Account Password 
Management platform designed to support 
data centers of various types, including mul- 
tisite, heterogeneous, and high-volume cen- 

ters. CSPM is designed to offer ensured 
high availability in distributed networks and 
improved integration with homogeneous 
data centers, all without disrupting the sys- 
tem or causing downtime. 

CSPM utilizes streamlined deployment 
options, improved integration into existing 
environments, scalability, and availability to 
help companies improve compliance, pro- 
tect confidential data, decrease system 
downtime, and reduce operational costs. 

CSPM allows regular password changes 
and password policies to be applied to serv- 
er-based accounts. It eliminates hard-coded 
passwords by removing the need to share 
passwords with developers, so the problem 
of needing to create a new password doesn't 
require redeployment of applications. 

Other features of CSPM include reliabili- 
ty across multiple sites and plug-and-play 
application server support. Deployment 
options enable one CSPM deployment to 
act as a primary core with support for multi- 
ple remote data centers. 

Cloakware Server Password 
Manager v3.5 

Server password manager with high availability, 
easy integration, and broad deployment options 

(703) 752-4830 


datacenter solutions 


September 5, 2008 

Centralized Control 

B&L's Vertices Tape Management Software 
Puts Control All In One Place 

The handling of your company's media is 
not something to be taken lightly. Vertices, 
a comprehensive tape management software 
solution from B&L Associates, collaborates 
with your backup system and gives you 
absolute control over your company's 
media, all with one simple application. 

With Vertices, users can monitor the 
usage and movement of media at all their 
company's storage sites, onsite and off. 

The Media Management System 

Having this kind of control translates to a 
rapid response to information requests 
such as audits. Users can also use Vertices 
to log mainframe media from their CA-1 
or RMM systems. In addition. Vertices 
will automatically import tape information 

from legacy tape management systems or 
backup applications and quickly verify 
tape movements via barcode scanning. 

Vertices is compliant with government 
regulations such as HIP A A and Sarbanes- 
Oxley. It tracks, locates, and protects data 
with recovery capabilities, as well as cre- 
ates an audit trail so that companies can 
easily provide reports when necessary. 
And accidental deletion of information is 
no worry with Vertices' purge and recov- 
ery system, and its two-tiered security sys- 
tem allows for role-based profiles so that 
people only see information relating to 
their security level. 

Vertices distinguishes itself with its flex- 
ible composition that can adapt to different 
operating environments. Users can expand 

Vertices' capabilities by choosing optional 
modules that better suit their company's 
setting. Vertices Automation Module inte- 
grates with several popular backup applica- 
tions. Other modules are available, as well, 
such as the RFID Module and the Foreign 
Media Module. 

B&L Associates Vertices 

Starts at $10,900 for Vertices Small Business Edition 

Comprehensive tape management solution that gives 
users control over their 
company's media at all 
storage sites 



Page 24 

Are SMEs 
Avoiding Vista? 

The Ins & Outs 

Of Delaying Vista Deployment 

by Robyn Wei smart 

Many analysts thought that the reason 
Vista had yet to take off was because most 
IT departments were waiting for SPl to 
banish any bugs or security weaknesses 
typical in the first iteration of any new 
operating system. Moreover, Microsoft's 
decision to stop selling new versions of 
Windows XP was expected to jump start 
the migration to its newer OS. 

Instead, Vista increasingly is looking 
DOA, says Rob Meinhardt, CEO of sys- 
tems management solution provider KACE 
( Recently, King Research 
updated a study on Vista adoption on 
behalf of KACE and discovered that 60% 
of those surveyed have no plans to deploy 
Vista. And 92% say that Vista SPl has not 
changed their plans for Vista deployment. 

The Reluctance To Upgrade 

For his part, Paul Troyer, Web and sys- 
tems administrator at worker's compensation 
software provider Tropics Software Tech- 
nologies (, lists several 
reasons for his company's reluctance to 
upgrade. First off, Troyer' s company does 
not want its operating system dictating its 
hardware upgrade cycle. "We believe there 
will be a learning curve and productivity loss 
when we roll out Vista, and we're too busy 
currently to deal with training," he says. 

Moreover, some of the company's back- 
end software isn't compatible with Vista, 
which translates into expensive upgrades or 
investing time and energy sussing out an 
alternative solution. "We see no real advan- 
tage or 'must have' features in Vista," says 
Troyer. "Microsoft stripped out most of the 
main features [Vista] was supposed to have 
so it could ship." 

What about Vista's vaunted security 
improvements? Says Troyer: "We agree [with 
Microsoft] that it is more secure, but in our 
environment with Active Directory, hardware 
firewall, and antivirus [applications], we are 
reasonably comfortable with XP." 

Wait & See 

Roger Kay, founder and president of 
technology market analysis firm Endpoint 
Technologies (, concurs 

parts, keep inventory, print out invoices, and 
keep customer lists. "He's used the same sys- 
tem for 20 years, and every so often a white 
box guy comes around and tunes up every- 
thing. The service contract is maybe $100 a 
year." Kay says this is an extreme example, 
but nonetheless, it further illustrates Troyer' s 
notion that a business should dictate upgrade 
cycles rather than the other way around. 

Granted, Windows 7, due out in 2009 or 
2010, does build on Vista and will most like- 
ly prove to be a bigger leap from WinXP 
than Vista, Kay points out. "But the ratio- 
nale may be, 'It's going to cost me more 
money to make this conversion, so why not 

The increasing use of Web-based 
applications and virtualization is mal(ing 
operating systems increasingly irrelevant. 

with Troyer that for many organizations. 
Vista offers minimal, if any, benefits and 
that WinXP is more stable for the time 

"The level of disruption is high," says 
Kay. "Vista's model is very different from 
XP, and you may need new hardware — not 
just PCs but other devices like printers." 
Moreover, Vista requires new applications, 
including homegrown programming. 
Software and drivers need to be modified to 
play nice with Vista, and it' s a crapshoot as 
to which partners make changes to make 
this a reality, Kay explains. 

"Microsoft warns, 'You'll lose your 
competitive edge,' but IT people are cyni- 
cal," Kay says. "They're thinking, 'Micro- 
soft doesn't understand my business. I'm 
not doing fantastic applications. I don't 
need my client to be so capable.'" 

Kay then cites that his mechanic uses 
Microsoft DOS on a 486 machine to access 
ancient programs that enable him to find 

hold on to XP for now and squeeze more life 
from my existing stuff?'" Kay says. 

Bypassing Vista 

Recently, KACE CEO Meinhardt wrote a 
blog entry titled "Businesses Like XP No 
Matter How Bad Microsoft Says It Is" 

September 26, 2008 

( It features a 
spoof screenshot of a devil crouched over 
text that reads "Microsoft XP, Evil Edition" 
over a black screen. 

Despite Microsoft's recent marketing 
campaigns extolling Vista's virtues. Vista 
lacks anything compelling to cause IT 
managers to switch, Meinhardt says. 
"Historically, there was always something 
compelling going to the new operating sys- 
tem — it was more stable or faster or some- 
thing. Vista may have a flashier user inter- 
face, but there's nothing that makes people 
say, 'Wow, I gotta have that,'" he says. 

Meanwhile, the increasing use of Web- 
based applications and virtualization is mak- 
ing operating systems increasingly irrelevant. 
SaaS applications look pretty much the same 
whether you use WinXP, Vista, Mac, or 
Ubuntu. Meanwhile, Google has put together 
a set of business tools (Gmail, Google Docs, 
and Google Calendar) that allows businesses 
to bypass Microsoft entirely. 

At the same time, Endpoint' s Kay says 
that switching to alternative desktop operat- 
ing systems does not make sense for many 
businesses. Red Hat recently withdrew sup- 
port for its desktop Linux OS, and there 
isn't another Linux-based desktop OS that 
is a first-class business OS, says Kay. And 
while Kay calls Apple's Mac OS X a won- 
derful operating system, Apple as a compa- 
ny does not behave in a manner appropriate 
for businesses. 

Finally, Kay thinks that Microsoft will 
slowly taper off support of WinXP. "There 
is scrambling in Redmond to make sure 
that XP support overlaps right up to 
[Windows] 7's release," he says. "At this 
point, the Windows 7 guys are being seen 
as white knights." ui 

Notable Numbers From The King Research Study 

According to King Research, 1 ,162 IT profession- 
als responded to its June 2008 online survey, an 
update to its original November 2007 study on 
KACE's behalf. More than 99% of respondents 
used Windows in their network deployments. 

Here is a sampling of the statistics: 

• 60% of respondents say they do not intend to 
deploy Vista. 

• 92% of respondents say Vista SP1 has not 
changed their Vista deployment plans. 

83% of respondents say that Vista's ability to 
play well with their companies' necessary 
business applications concerns them. 
14% of respondents plan to skip Vista alto- 
gether in favor of Windows 7, while another 
1 4% report they have delayed Vista deploy- 
ments to learn more about Windows 7. 
42% of respondents are contemplating deploy- 
ing non-Windows operating systems to avoid a 
Vista migration, with 29% saying that Mac OS X 
is their top choice. 

Stretching Data 

Continued from Page 23 
is to use software that helps IT manage- 
ment know and understand what is under 
the data center umbrella. This includes both 
local and remote assets. 

A company should have a configuration 
management database, which is a repository 
of all of the hardware and software compo- 

Center Dollars 

nents in the system, McGlynn says. There is 
a way to make that economical, too. 

"These need to be federated," McGlynn 
says. Federation of databases is joining of 
pockets, maintaining information from a 
variety of sources in one database. "You 
don't need to keep data in two places. If 
you do, one or both will get out of sync." 

Configuration management software has 
other capabilities. It will allow management 
to deal with capacity issues by optimizing 
placement of servers in the data center. 

"Know which ones are your hot racks and 
which are your cool racks," McGlynn con- 
tinues. It sounds obvious, but it is a com- 
monly ignored factor. "Where do production 
servers go?" he asks. The answer, of course, 
is "at the bottom" because production 
servers generate a lot of heat, and heat rises. 

"If you place servers intelligently, you 
will maximize both space and power," 
McGlynn says. 

Another dollar saver is balancing power 
use in the data center. "Beware putting all of 
your big power consumers on one side of the 
data center," he adds. Mapping the data cen- 
ter allows IT to understand its heat patterns. 
Every time there is a new service request, 
consult the process automation software to 
allow optimization of cooling and power. □ 


August 8, 2008 

Get Cash For Your Data Tapes 

Recycling Your Media Has Never Been So Safe, Sound & Simple 

Data tapes we recycle: SDLT, 9940, 3590, LTO, AME AIT, and many others. 

Most enterprise data centers are ap- 
prehensive about recycling data tapes due to 
security. Recycle Your Media is one of the 
largest and most respected full-service data 
tape recycling companies worldwide. is the most 
viable solution for your end-of-life data 
tapes. Recycling your media is environ- 
mentally sound and economically sensible, 
given that it can recoup IT costs. 

When recycling your data 
tapes, you need to be assured 
that the data will be destroyed 
and rendered unreadable. We 
practice the most secure meth- 
ods, complying with govern- 
mental privacy and storage 
laws. We are highly experi- 
enced in data eradication and will offer 
data destruction certificates and volume 
serial reports to ensure your sensitive data 
is irretrievable. 

Matthew Bernard, IT network manager 
at John Wiley & Sons, says, "Although 
hesitant to release my used data tapes, I 
found Recycle Your Media's data tape 
recycling service to be secure, profession- 
al, and more than I expected." 

Recycle Your Media works with Fortune 
500 firms, banks, government agencies, law 
firms, and hospitals, making us a reliable 
source for all data tape recycling needs. 

Why pay for tape shredding? Recycle 
Your Media can pay you to recycle your 
data tapes. Recycling data tapes is simple: 
Give us a call and we take care of the rest. 

Recycle Your Media 

We buy all types of tapes and recycle them using 
secure and environmentally sound methods 

(877) 798-2737 

IB^ecv cleYourMedia 


September 26, 2008 

High Density 
Means Hieh Coolins 

Avoid Overloading 
Your Cooling System 

by Drew Robb 

The latest hardware has certainly made 
it much easier to pack a lot more horsepow- 
er in a smaller package. Blades, of course, 
have shrunk the form factor of the average 
server, and quad-core chips make it possi- 
ble to quadruple the amount of juice in the 
same footprint. 

"Blades are the fastest-growing segment 
in the server market," says John Enck, an 
analyst at Gartner. 

Now factor in virtualization. By setting 
up 10 virtual machines in a single blade, 
you are going to be taking up every possi- 
ble unit of processing power — the only 
problem is that you are going to be generat- 
ing a whole lot more heat. 

"The adoption of high-density servers 
has been somewhat of a forced migration," 
says Kenneth Wolverton, vice president of 
data center operations at CyrusOne (www "Like the evolution from 
cassette tapes to CDs, manufacturers are 
simply not offering or supporting legacy 

Analyst firm IDC has noted that approxi- 
mately 75% of SMEs are in the process of 
implementing high-density computing plat- 
forms. By 2012, that number will approach 
100%. Unfortunately, this effectively ren- 
ders the existing power and cooling infra- 
structure obsolete. 

According to CyrusOne, traditional data 
centers operate at approximately 100 watts 

Raised Floor Or Not? 

When it comes to coping with the densities of 
tomorrow, SMEs are advised to abandon any 
and all preconceptions. Best practice texts 
from only two years ago, for instance, stress 
not to have more than 2kW per rack. Throw 
that one out of the window right now. 

Similarly, the time-honored under-floor plenum 
concept may be under threat. 

"A raised floor goes against the laws of 
physics as cold air falls and hot air rises," says 
Missy Young, executive vice president of 
sales engineering at Switch (www.switch 

per square foot. A high-density infrastruc- 
ture, on the other hand, requires an average 
of 250 watts per foot. For example, high- 
density blade servers operate at 50 amps, a 
major increase over previous 
server generations that typical- 
ly ran at 20 amps. As a general 
rule of thumb, it takes $1 (of 
utility power) to cool every 
dollar in direct consumption in 
a high-density data center. 

"To temporarily alleviate 
cooling challenges, users are 
inefficiently spreading out their 
high-density systems across 
rows of their data centers," 
says Wolverton. "This mini- 
mizes the usages of white floor 
space and requires the installa- 
tion of additional computer 
room AC (CRAC) units." He 
offers some recommendations 
to avoid overheating in highly 
dense spaces: 

Architecture. The subfloor 
ventilation and perforated tiles 
should be designed and laid 
out using engineering-driven 
schematics that maximize output and avail- 
ability for any emergency overheating situ- 
ation. Ventilation in a high-density envi- 
ronment requires a minimum 3 -foot raised 
floor to accommodate necessary subfloor 
equipment. Racks should be set up in a hot 
aisle/cold aisle configuration with dual air- 
flow designed to effectively disperse cold 
air into the cold rows and to pull hot air off 
the hot aisles, minimizing the mix of cold 
and hot air. 

Tools. High-density data centers should 
take advantage of a CFD (computational 
fluid dynamics) simulation 
to engage the entire layout 
of the data center and run 
through all the "what if" 
scenarios to identify hot 
spots and potential problem 
areas. CFD simulations 
can also be used to identify 
the strategic placement of 
CRAC units to ensure that 
optimal airflow can be 
diverted and/or increased to 
any potential hot zones. 
"SMEs should make capital 
investments in existing 
infrastructure to upgrade 
their data center to accom- 
modate high-density, i.e. 

additional CRAC units, rearchitecture of 
aisles, and using tools like CFD," says 
Wolverton. "Alternatively, they can select a 
high-density colocation that guarantees 

Cold air is brought in above the racks and allowed to fall down in front of the servers. 
Hot air is completely contained and channeled above the ceiling at the SuperNap 
facility in Las Vegas. 

availability, scalability, and increased watts 
per square foot." 

Winning The Battle 

Phil Francisco, vice president of product 
management and marketing at Netezza 
(, says that in the com- 
ing years, SMEs will battle to bring power 
consumption under control. 

"Industry analysts predict that soon, 50% 
of data centers won't be able to cool off," 
says Francisco. "According to IDC, by 
2009, technology operations in the U.S. 

Page 25 

will spend twice as much for power and 
cooling as they did to buy the server hard- 
ware in their data centers." 

He feels the solution lies in specially 
architected racks and appliances tailored 
to specific purposes, such as data ware- 
housing, storage, and supercomputing. 
These customized solutions are being 
designed with much greater energy effi- 
ciency, lower power consumption, and a 
smaller footprint. 

Alternatively, some SMEs may find that 
it is simply more efficient to implement 
blades and virtualization in a colocation 
facility. Some of these organizations have 
the resources to implement 
state-of-the-art cooling and 
power architectures that most 
SMEs can only dream of. 

Shoe retailer, 
for example, uses colocation 
to host its IT services. As a 
result, it can pack blades as 
densely as it wants into a 
small space. It began with four 
racks and built the IT side of a 
$700 million success story 
around that hosted hardware. 
It has expanded now to a large 
cage of hardware at the colo- 
cation facility. 

But it makes a difference 
which colocation facility you 
choose. One company, for 
example, wanted to deploy 38 
racks packed with blades and 
pizza box servers and asked 
various colocation facilities for 
an estimate of costs. One pro- 
vider has the cooling and power infrastruc- 
ture to support all those racks in 720 square 
feet. Others with less efficient cooling 
setups estimated up to 16,000 square feet of 
rented space with each rack spread around 
with a minimum of 20 cubic feet of air cir- 
culation. You can guess which vendor 
quote would be the highest. 

So check just how much power your 
potential colocation facility can accom- 
modate. In the paragraph above, the 
quotes ranged from 17kW per rack to 
IkW per rack. 

A dual air plenum architecture, in conjunction with a hot aisle/cool aisle configuration, is used 
in high-density data centers to accommodate increased watts per square foot requirements. 

How Do You Research & Make Your Buying Decisions? 

The proven track record of Processor's print issue and Web site offer an unbeatable combination! 

When you're looking for product or buying information, turn to the print issue for a wide variety 
of current products from our list of hand-selected manufacturers and resellers. 

Once you're ready to buy, turn to our Web site to connect with companies offering the products 
and services you need. 

For More Information Call: (800) 247-4880 
International Calls: (402) 479-2141 
Or Contact Us On The Web: 

Page 26 

September 26, 2008 


Securing Mobile Data 

Employee Education & Security Measures 
Are Key To Protecting Data On The Move 

by Carmi Levy 

vices and higher-capacity wireless networks 
enable users to get more work done from 
wherever they are, security concerns contin- 
ue to dog IT. Keeping confidential client and 
organizational data is challenging enough on 
conventional desktop computers. But when 
employees can carry it out the door at the 
end of the day, it opens up entirely new 
forms of vulnerability. 

If you're concerned about keeping your 
mobile data from falling into the wrong 
hands, consider the following tips as part of 
your overall mobile data security strategy. 

Educate Your Mobile Users 

Although mobile- specific security tech- 
nologies are rapidly becoming more capable, 
affordable, and ubiquitous, no technology 
can protect the organization unless its em- 
ployees are properly trained and rewarded. 

Jack Gold, president and principal ana- 
lyst of J. Gold Associates, says companies 
can't afford to ignore the human factor. 

"No matter what kind of technology you 
use, human behavior is always going to get 
in the way," he says. "If you look at the 
history of security breaches, most have 
been because some human made a mistake. 
So if you get your people trained and on 
your side, it really helps you reduce the risk 

because the human element is always the 
hardest to fine-tune." 

Gold recommends investing in upfront 
and ongoing training for everyone and 
making sure process-specific documenta- 
tion is easily available. Compliance falls 
off when employees don't know how it 
works or can't get the help they need. 

Draft acceptable-use policies and enlist 
HR for universal sign-off. Tie compliance 
to performance management processes. 
Solicit input from users when drafting new 
policies, which Gold says maximizes buy-in 
and ensures these procedures will be well- 
received. It also ensures a realistic balance 
between company and end-user needs. 

Encrypt & Authenticate 

Although a top-level password can slow 
mobile users down a bit, it represents a vital 
means of protecting these easily lost or stolen 
devices. Activate password protection on all 
newly delivered devices and ensure users 
don't turn it off afterward. Set a timeout to 
automatically lock inactive devices and 
implement remote kill and wipe in case they 
disappear. Mobile security features should be 
installed in such a way as to prevent end 
users from disabling them. Remove mobile 
privileges from users who refuse to comply. 

As with conventional desktop and laptop 
computers, install security software to pro- 
tect against viruses, Trojans, and other 


■ Properly define your 

devices. Many organizations 
focus their attention solely on 
laptops, mobile phones, and 
smartphones. They should 
expand their scope, as data 
can easily reside on a wide 
range of mobile devices, in- 
cluding USB drives, media 
players such as iPods, mem- 
ory cards, and even in-car 

Make sure your acceptable- 
use policies specifically refer 
to the full range of mobile de- 
vices that can potentially be 
used within your organization. 

Update the documentation 
regularly to reflect new tech- 
nologies and allow only those 
devices or media that support 
encryption and other forms 
of protection. 

■ Don't be afraid to punish. 

Accountability is critical if 
employees are expected to 
consistently follow secure 
mobile data management 
practices. Jack Gold, presi- 
dent and principal analyst 
of J. Gold Associates, says 
companies must document 
expected organizational re- 
sponses to security breach- 
es. These can range from a 

simple slap on the wrist to 

"Your data is important. And if 
you screw up, there are penal- 
ties, as there should be," says 
Gold. "Sometimes it's very 
innocent and people weren't 
doing anything intentional. But 
companies should still have 
policies in place so they can 
understand why it happened 
and who's responsible. 

"Sadly, it's a bit like dealing 
with your kids," he adds. "If 
they're naughty, sometimes 
you have to send them to their 
room for a while." 

forms of malware. Update your firewalls to 
protect mobile devices, as well. 

Select only platforms that offer end-to-end 
data encryption. Gartner analyst John Girard 
recommends using strong algorithms and 
FIPS 140-2-certified products. Although 
encryption often bogs down older hardware, 
newer infrastructure handles it without a 
noticeable impact on performance. 

Leave Your Data In The Office 

Wireless access to corporate resources 
should, in theory, reduce the need to carry 
around large amounts of data on your 
mobile device. Girard says not taking it 
with you can actually improve work quality. 

"If I am trying to make up-to-date deci- 
sions, I need up-to-date data, and it's going 
to be fresher if it stays in a database on my 
server," he says. "Online applications solve 

"No matter what kind 
of technology you 

use, human behavior 
is always going to 
get in the way." 

- Jack Gold, president and principal analyst 
of J. Gold Associates 

a lot of integrity problems and dramatically 
reduce data exposure." 

Similarly, Girard advises laptop users to 
avoid caching local data if the job is natural- 
ly done online. Old data and its supporting 
applications are also risky. Once mobile 
users no longer need them, ensure they have 
the tools they need to remove them for good. 

Close The Gaps 

The best mobile security plans can be 
compromised by easily missed device set- 
tings. For example, encrypted files may 
become unencrypted when copied to an 
external drive or memory card. As more and 
more smartphones support high-capacity 
cards, the data may be completely exposed 
if the device is not properly configured. 

Some misbehaving applications interfere 
with the device's timeout feature. As the 
timeout is a critical element of device securi- 
ty, software that quietly keeps the device 
from timing out represents a serious source 
of vulnerability. Take the time to deliberately 
find — and eliminate — these gaps. 

Best Risk Avoidance: 

Just Sync It 

The only thing worse than losing a device 
loaded with data is losing a device loaded 
with data that wasn't backed up or synchro- 
nized. Before any device is deployed, ensure 
any data stored on the device is automatically 
synced to a secure corporate resource. Man- 
date regular sync activities even for the most 
far-flung road warriors. 

As much as possible, automate the process 
to reduce the risk of user-driven errors. Reg- 
ularly analyze backed-up data to ensure it is 
valid. As with conventional data backup, you 
don't want to learn your backups have been 
saving gibberish the morning after your CEO 
reports that his BlackBerry was stolen during 
a business trip. 

If a regularly synced device is lost or stolen, 
business continuity is maintained by simply 
deploying a replacement unit and restoring 
the data. Meanwhile, even if the device was 
stolen by a thief bent on compromising your 
organizational data, these efforts will be sty- 
mied by full encryption and password pro- 

Best Return On Investment: 

Automate Compliance 

Having acceptable-use policies on the books 
won't benefit the organization unless every- 
one consistently plays by the same rules. Un- 
fortunately, manual tracking of compliance is 
labor-intensive and expensive. 

Help desks often lack the bandwidth to handle 
the additional mobile monitoring and enforce- 
ment workload. Adding staff is an inefficient 
solution. To address this, the organization 
must take as much responsibility for compli- 
ance out of the hands of the end user as pos- 
sible. People make mistakes, which can ripple 
throughout the organization. 

To address this, leverage automated mobile 
management tools— often built into mobile 
server infrastructure and freely available to 
IT administrators— to ensure mobile devices 
are provisioned, configured, maintained, and 
used in a proper policy-friendly manner. Re- 
mote system diagnostics and software dis- 
tribution, password reset self-serve, and 
scheduled system audits can reduce support 
infrastructure overhead and still ensure every- 
one is using the devices as intended. This 
also minimizes the potential for data loss or 
breach in the event that a device falls into the 
wrong hands. 

Thanks to DMD, we 
don't have to sit on 
our old computer 
equipment anymore. 

When it comes to IT equipment 
liquidation or disposal, we are 
serious. Let us worry about data 
security and destruction, EPA 
regulations, transportation, down 
time and insurance. Don't tie up 
your resources or take chances with 
your data or environmental issues. 

Call DMD today! 
(877) 777-0651 

We Purchase: 

Networking Equipment 
Te I econn/ Network 
Complete Data Centers 

We Offer: 

Asset Tracking/Reporting 


DOD Level Data/Mechanical Destruction 

EPA Recycling/Reuse 

Ongoing Support Plans 

Technology Refresh/Install Programs 

Find out wliy some of tlie top U.S. companies and Government 
Agencies call DMD Systems Recovery. 



A Slightly Different Company"^'^ 
Toll Free: (877) 777-0651 Phone: (602) 307-0180 Fax: (602) 307-0181 
Providing QUALITY GOODS and SERVICES for Industry. 
Member of AFCOM, Better Business Bureau, Chamber of Commerce. HP Authorized. Member of NAID (National Associati 


for Information Destructioi 




HP U 4250N 

HP U 5035XS 

HP LJ 4300 

The ^ 


All printers include parts 
and labor warranty. This 
is only a small sample 
of what we have in 
stock. Please call for 
price and availability 
for other models, 
accessories and parts. - 

Over 150 different HP LaserJet printer models in stock! 

Buy your HP laser printers from the industry leader. WTren you purchase 
a printer from GPS you are buying the best refurbished printers available. 
We offer a one year warranty on printers and free technical support for 
the life of the printer. We can provide you with a specific model you are 
looking for or one of our experienced staff can help you select the printer 
that will best meet your needs. Your satisfaction is our number one ^^^^^ 
priority, so if you are not completely satisfied with your purchase you cart\^ 
return your printer for a full ^nd. V 

/ Resellers Welcome. 

Source for Printers 

800-588-3554 • 608-268-4300 • Free Tech Support 

September 26, 2008 

Page 27 

WHAT'S Happening 

Repackaging Risk Management 

CMS Products Works Toward Better 
Enterprise Backup, Recovery & Security 

by Daniel Sweeney 
• • • 

Miniature high-capacity hard disks, 

sometimes called thumb drives, comprise a 
thriving category in the mobile enterprise. 
So much so that industry pioneers may find 
themselves facing lots of agile insurgents. 

CMS Products, located in Costa Mesa, 
Calif., is one such pioneer, with more than 
25 years of experience in data backup and 
disaster recovery. Beginning as a distribu- 
tor for purveyors of large enterprise storage 
solutions, CMS (800/327-5773; www.cms focuses on product develop- 
ment, marketing, and distribution. 

Storage Niche 

CMS claims a special niche in the 
portable storage space, which has thus 
far provided the firm with strong, consis- 
tent growth. 

"We don't lack for competitors," admits 
Gary Streuter, vice president of marketing 
for CMS Products. "So what makes us stand 
out aside from our higher prices? We're the 
spare tire of disaster recovery," he says. 

CMS works to develop hard drives and 
programs for data backup and recovery, 
encryption, and security, which are areas, 
as Streuter points out, that don't lack for 
rivals. Both Streuter' s spare tire analogy 
and the reference to disaster recovery are 

indicative of how CMS attempts to position 
itself against those rivals. 

As Streuter sees it, most external disk 
drive vendors market their products as 
appliances or computer accessories. CMS, 
on the other hand, wants to be seen as a 
comprehensive solution provider, of which 
the company's proprietary Windows-based 
software is a vital part. 

The chief selling point of BounceBack 
and Ultimate BounceBack, two of the com- 
pany's solutions for data recovery, is that 
they reconstruct the computing environ- 
ment in full by restoring all applications 
and settings as well as simply files (the 
company has trademarked this particular 
function, called QuickRestore). 

"Just like the spare tire," Streuter says. 
"You exchange with the flat, and you're 
back on the road." 

CMS distinguishes its offering from prod- 
ucts that mirror or image the workstation 
and don't provide the full functionality of 
the machine being imaged. As an example, 
Streuter says, "I visited my dry cleaner 
recently, and his hard drive had just crashed. 
All of his billing and customer information 
was on that drive. If he'd had BounceBack, 
he would have been up and running again in 
a few minutes. It's not just saving your data; 
it's continuing to serve your customer base 
with almost no interruption." 

BounceBack also enables the user to 
operate the host computer from the external 
drive via a USB port. "Think of it as a fail- 
safe; a life support system," says Streuter. 
"The idea is to remedy the situation that 
caused the crash as quickly as possible, not 
to continue to operate off the external 
drive. That's why it's like a spare tire." 

BounceBack even has provisions for pro- 
viding such remedies within its software 
suite. Features within the suite perform 

diagnostics on the internal hard disk and 
attempt restoration and reconstruction. 

Unique Offerings 

Wolfgang Schlichting, an analyst with 
IDC specializing in storage and data 
recovery software, feels the BounceBack 
offering is unique. "There are lots of 
hardware manufacturers competing with 
CMS in the external hard drive space 
and a number of software vendors selling 
products with somewhat similar function- 
ality to BounceBack, but no one's provid- 
ing the total package. It's the synergy that 
is unusual. The QuickRestore functionali- 
ty that lets you operate the laptop from 
the external drive is especially powerful. 
I don't know of anything else that will 
do that." 

Like most of the competition, CMS' 
ABS Rugged, Plus, and Secure external 
drives for both notebooks and desktops are 
extremely compact. But what distinguishes 

these drives from the competition is their 
flexibility and versatility. 

CMS's redundant backup product, dubbed 
the Velocity2, incorporates BounceBack 
Enterprise Server software that can be pro- 
grammed to back up files and applications 
at intervals ranging from one minute to 
one hour. 

CMS also offers a line of security prod- 
ucts, including CE Secure Vault Edition, 
for encryption using the AES-256 algo- 
rithm; the Vault OTG, an encrypted flash 
drive; and ABS Secure, an external USB 
encrypted disk product. CMS' encryption 
software operates almost invisibly in the 
background on both the laptop and exter- 
nal backup drive. Biometric authentica- 
tion is standard, ensuring that if units 
are stolen, sensitive information will re- 
main inaccessible. 

Value Add 

CMS sees its software as a considerable 
value add, which contributes to the relative- 
ly high retail price of the BounceBack sys- 
tem. "We're not giving it away like our 
competitors," says Streuter. 

For enterprises, the loss of data, whether 
it' s on a laptop or other device, can create a 
disaster and potential liability. That's why 
CMS goes beyond simply selling boxes and 
works toward providing overall disaster 
recovery and risk management packages 
for enterprise customers, especially mo- 
bile professionals. 

As for the future, according to Streuter, 
the company will continue to develop 
and improve its enterprise offerings but 
will also promote the BounceBack 
bundle within the consumer market- 
place, offering it as a solution for preserv- 
ing multimedia files. 

"We're the spare tire of disaster recovery." 

-CMS Products' Gary Streuter 


The Power To See All 

Endace Offers Products To Monitor, Capture, 
Inspect & Report On Your Network's Data 

by Brian Koerner 

Endace provides network monitoring, latency 
measurement, and application solutions to cap- 
ture, inspect, and report on all of an organiza- 
tion's data flowing over its network. The compa- 
ny, founded in 2001 and headquartered in Auck- 
land, New Zealand, has about 100 employees 
with offices in the U.S., Asia, and Europe. 

According to Chris Komatas, the director of 
product management and operations, Endace 
( has many blue chip corpo- 
rations, financial institutions, and government 
agencies that rely on its products. Komatas 
explains that because of the unique approach 
and hardware-based technology that Endace 
brings to the marketplace, Endace clients are 
able to guarantee network security, integrity, 
and performance for their users and applica- 
tions, regardless of transmission speed, load- 
ing, or interface type. 

■ What are the biggest IT-related 
issues facing today's small to 
midsized enterprise? 

"Existing network monitoring has been de- 
ployed using vertically integrated products 
with a single probe per application, or with 
network switches/routers used to collect net- 
work monitoring data, generally reducing 
their performance," Komatas says. "This 
approach to network monitoring drives high- 
er cost of equipment both in cap-ex and op- 
ex and most will not scale to monitor at 
10Gb network speed." Organizations are 
now faced with trying to decrease the cost 
and complexity associated with having so 
many products and applications analyzing 
data. "Endace can help them standardize 
their approach and reduce costs and com- 
plexity," he says. 

■ What should Processor reaAers know 
about your company's products? 

Endace offers a variety of products, including 
network monitoring interface cards and Ninja 
appliances and platforms. The Endace DAG 
network monitoring interface cards provide 
100% packet capture and hardware-based pre- 
cision time-stamping, traffic filtering, data stream 
replication, and CPU load-balancing functions. 

According to Komatas, "The Endace DAG 
interface technology complements the Intel 
multicore strategy, optimizing processing capa- 
bilities to provide significant acceleration for 
data-intense network analysis applications." 

The Endace Ninja appliances provide a hard- 
ware-optimized system that takes advantage 
of the wire-speed capabilities of the Endace 
DAG technologies and can quickly be installed 
and deployed with a variety of features and 
functionality, secure remote management, and 
configuration backup capabilities. 

"NinjaProbe is the first multifunction probe de- 
signed to be monitoring-application-agnostic but 
directly deliver important data and analysis tools 
for operations," Komatas says. "The NinjaProbe 
can be widely deployed across an entire net- 
work infrastructure to provide monitoring and 
reporting and to feed multiple central monitoring 
applications at 10 [Gigabit Ethernet] speeds." 

"The NinjaProbe captures 100% of data with 
nanosecond packet time-stamping and high- 
speed capture allowing IDS, forensics, and 
traffic analysis. This approach replaces multi- 
ple separate probes. The NinjaProbe is in- 
creasingly being deployed in financial net- 
works where latency and monitoring are worth 
millions of dollars but equally applies in other 
industry segments," Komatas says. 

Endace's NinjaBox platforms provide a scal- 
able open platform on which an organization 
can migrate existing network traffic analysis 
applications to meet the demands of analyz- 
ing traffic at up to lOGbps. The platform pro- 
vides intelligent management of captured 
network data so existing software applica- 
tions and configurations can be accelerated 
with minimal changes. 

■ What makes your company unique? 

"Endace is unique in developing the un- 
derlying monitoring card hardware for the 
NinjaProbes," he says. "This unique tech- 
nology enables 100% packet capture with 
nanosecond packet time-stamping available 
across all high-speed interfaces. Our solu- 
tions range through to a unique 40Gbps 
monitoring solution." Komatas says that 
Endace also is focused on understanding 
its clients' business problems and aligning 
solutions to meet client needs. 

Page 28 

September 26, 2008 

InBus Has Intel 
Boards & Systems! 

InBus Engineering 
Has the World's Largest Inventory 
of Hard-to-Find 
Intel Boards and Systems 

6Pj;000 Square Fqp^^^^ 



Same Day Deli very 


We Purchase Excess Inventory 

Call (925) 454 -2546 



6233 Industrial Way, Livermore, CA 94550, Tel (925) 454-2500 Fax (925) 454-2501 

to say, 

Computtr Solutions 


J (^TallyGenicom WYSE OKI 

^Boundless aBQIS 0?m^c!^ 

• Wyse and HP Thin Clients 

• Wyse, Link, ADDS, and 
Digital/Boundless Dumb Terminals 

• OKI Impact Printers 

• TallyGenicom and Printronix 
Line Printers 

• Label Printers 

• Digital Check and Panini 
Check Scanners 

GolSreen with 

, _ remanufactured 

email: sales@vecmar.coiin equipment! 

Computer Connection 

I of Central New York, Inc. ^ 

For all your IT Network & Security Needs 

yMs, C^,^^ Cisco Systems 

wSun coMPAa mmm 

^'-^°^y^^^^^ MilllliiillllMI. 
f==;5:=RrinET- Array Networks BLUE-ARC 


$$ CASH $$ 

$$ CASH $$ 

media recovery 

Datacenter products and services 


Magnetic Tape Media: 
9940 • 9840 • 3590 • LTO • SDLT 

Please Contact 

Al Bass 
abassignani @ 

Visit our new web site at: 

$$ CASH $$ 

$$ CASH $$ 




Fax 770-931-9416 

www. dbgweb . com 

AlphaServer GS160 Model 16 

Base System for OpenVMS 

• DY-160CG-AA 

• One Alpha 21264 Processor 1224 MHz 

• Four Quad Building Blocks 

• One 14-Slot PCI Shelf 

• OpenVMS Operating System License 


• Additional 1224 MHz CPU w/SMP 

• Additional Memory 

• Additional PCI Shelves 

• Additional PCI Options 

2 Systems In Stock! 

Authorized COMPMX Reseller 


iQff E.L.I. 

I Call for a Quote Today! { 

Quick Shipping 
In-house Technical Staff 
International Shipping 

Phone 800-447-1156 
Fax 617-354-1417 


Sun Fire 

Sun Blade 


3310/3510 Array 





Entry/Midrange Servers 

288 Norfolk Street 
Cambridge, MA 021 39 

For our complete 

online catalog 

go to www*elLcom 


Comm. Gear 




Catalyst Series Switches 
Network Modules 
Pix Firewalls 
Port Adapters 
VPN+ Security Product 


Sen/ing the ITIndustty for 20 Years 

(800) 426.5499 TOLL FREE 

(508) 230.3700 LOCAL 
(508) 238.8250 FAX 








QinHl Information 
H m Technology 
I MM I Trading 

m — We Buy, Sell and Lease IBM 
®— AS/400 • RS/6000 • Servers 
(S) — System Upgrades 
® — Advanced 36 Systems 
Tape Subsystems 
Printers, Terminals, Modems 
O — 21 Years Experience 

Ph: (877) 715-3686 ggj 
Fx: (405) 715-3682 SSl 
WWW. itechtrading. com 

We Also Buy 
All Other 
Brands of 

Attention data Center/ IT Managers 

Where do you go to find the 
newest products available? 

Check out each week's issue for . . . 

' Marketplace ads filled with in-depth 
information on new products. 

' Quick rundowns of all new data center-related 
products released in the past week. 

' Articles with valuable productoverviews and data. 

. . . then go to and take 
advantage of our online search tools to find 
even more in-depth information! 


"/Q^^^^t^ C^Pt^t^te^ ^]^l/U^/^^i^iti^v^f 

(800) 856-21 11 

5pec/aJfziffig /n POS /Bare ode mofketi'ng and hajidwar&ma/nfenartce. 

Over the past 20 years Pegasus Computer 
Marketing has evolved from a marketing 
company for mainframe terminals to providing 
both sales, maintenance, and flat rate repair for 
POS, barcode hardware of all makes and models, 
wireless and networking peripherals, laser print- 
ers, and flat panels just to name a few. PCM 
currently carries several large contracts with 
major retailers from POS units to handheld 
scanners, vehicle computers to access points 
and related peripherals. PCM can tailor flexible 
contracts to cover any client requirements. To 
ensure the quality of our products and services 
we offer only depot maintenance. 

Customer tailored secure Web-entry for RMA 
requests and instant RMA numbers. 

References available upon request. 

Poinf of Sole 

Handheld ^canneti 

Vehicle a 


Depot Ma 



New & Refugfished 



QMS^ Magnum® 


Ph: 574-935-9550 Fx: 5^935-9555 



New & Used - All Types of Data Tape Media 
Certified DATA DESTRUCTION Assured 

World's #1 Tape Buyer is The Data Media Source 
l-iighest values paid - Free pick-up at your site 

We Buy Used 

Cell Phones 

^r^%for each 
^^11 phone! 

u p to 

Some pliones have no value. See current purchase prke 
list for individual model prices at www.pacebutl*r.rarn 

1-800-248-5360 -(405) 755-3131 


iyterib© Today! 


Sut)scrlt>e Online! 

Go to